共 50 条
- [1] PUF-Based Authentication 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 337 - 344
- [3] PUF-Based Authentication Protocols - Revisited INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 296 - 308
- [4] Optimal Tradeoff of Secure PUF-based Authentication 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 83 - 88
- [6] PUF-based Authentication Scheme for IoT Devices 11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794
- [7] Lightweight PUF-based Continuous Authentication Protocol 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 229 - 234
- [8] A Double PUF-Based RFID Authentication Protocol Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1801 - 1810
- [10] PUF-based Smart Tags for Supply Chain Management ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,