Related references
Note: Only part of the references are listed.Secure remote anonymous user authentication scheme for smart home environment
Moneer Fakroon et al.
INTERNET OF THINGS (2020)
Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things
Binbin Yu et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)
Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems
Chun-Ta Li et al.
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2018)
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing
Vinod Kumar et al.
JOURNAL OF MEDICAL SYSTEMS (2018)
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System
Prerna Mohit et al.
JOURNAL OF MEDICAL SYSTEMS (2017)
Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment
Shin-Yan Chiou et al.
JOURNAL OF MEDICAL SYSTEMS (2016)
A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks
Durga Prasad Sahoo et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2015)
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
Jeroen Delvaux et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2015)
Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices
Debiao He et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)
A Secure Medical Data Exchange Protocol Based on Cloud Environment
Chin-Ling Chen et al.
JOURNAL OF MEDICAL SYSTEMS (2014)
Physical Unclonable Functions and Applications: A Tutorial
Charles Herder et al.
PROCEEDINGS OF THE IEEE (2014)
Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices
Cheng-Chi Lee et al.
IET COMPUTERS AND DIGITAL TECHNIQUES (2013)
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
Daniel E. Holcomb et al.
IEEE TRANSACTIONS ON COMPUTERS (2009)
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Yevgeniy Dodis et al.
SIAM JOURNAL ON COMPUTING (2008)