共 50 条
- [1] PUF-Based Authentication [J]. 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 337 - 344
- [2] Designing secure PUF-based authentication protocols for constrained environments [J]. SCIENTIFIC REPORTS, 2023, 13 (01):
- [3] Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (02):
- [5] Systematic Cryptanalysis of PUF-Based Authentication Protocols for IoT, A Case Study [J]. IEEE Networking Letters, 2023, 5 (04): : 304 - 308
- [7] WIP: Performance Metrics of PUF-based Authentication Protocols for Smart Grid: A Review [J]. PROCEEDINGS 2024 IEEE 25TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM 2024, 2024, : 1 - 4
- [8] Automated Analysis of PUF-based Protocols [J]. 2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 304 - 317
- [9] Optimal Tradeoff of Secure PUF-based Authentication [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 83 - 88