共 50 条
- [42] Optimal Tradeoff of Secure PUF-based Authentication 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 83 - 88
- [43] A Double PUF-Based RFID Authentication Protocol Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1801 - 1810
- [47] Efficient Fuzzy Extractor Implementations for PUF Based Authentication PROCEEDINGS OF THE 2017 12TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2017, : 119 - 125
- [49] Proving authentication property of PUF-based mutual authentication protocol based on logic of events Soft Computing, 2022, 26 : 841 - 852
- [50] Enhancing MQTT-SN Security with a Lightweight PUF-Based Authentication and Encrypted Channel Establishment Scheme SYMMETRY-BASEL, 2024, 16 (10):