共 50 条
- [4] Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (02):
- [7] PUF-Based Authentication Protocols - Revisited [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 296 - 308
- [8] Systematic Cryptanalysis of PUF-Based Authentication Protocols for IoT, A Case Study [J]. IEEE Networking Letters, 2023, 5 (04): : 304 - 308
- [10] PUF-based Authentication Scheme for IoT Devices [J]. 11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794