共 50 条
- [1] PUF-Based Authentication [J]. 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 337 - 344
- [2] Hardware Obfuscation using PUF-based Logic [J]. 2014 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2014, : 270 - 277
- [4] An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems [J]. 2022 35TH INTERNATIONAL CONFERENCE ON VLSI DESIGN (VLSID 2022) HELD CONCURRENTLY WITH 2022 21ST INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (ES 2022), 2022, : 108 - 113
- [5] PUF-Based Authentication Protocols - Revisited [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 296 - 308
- [6] Optimal Tradeoff of Secure PUF-based Authentication [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 83 - 88
- [7] PUF-based Authentication Scheme for IoT Devices [J]. 11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794
- [9] Lightweight PUF-based Continuous Authentication Protocol [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 229 - 234