共 50 条
- [21] Modeling Attacks and Efficient Countermeasures on Interpose PUF FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2020, 2021, 12637 : 149 - 162
- [23] Security Analysis of Index-Based Syndrome Coding for PUF-Based Key Generation 2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 20 - 25
- [25] Research on PUF-based Security Enhancement of Narrow-Band Internet of Things PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 702 - 709
- [26] PUF-Based Authentication Protocols - Revisited INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 296 - 308
- [27] Automated Analysis of PUF-based Protocols 2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 304 - 317
- [28] Protection Profile for PUF-Based Devices ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 91 - 98
- [29] iTPM: Exploring PUF-based Keyless TPM for Security-by-Design of Smart Electronics 2023 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, ISVLSI, 2023, : 67 - 72