4.7 Article

Multifactor authentication scheme using physically unclonable functions

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Secure remote anonymous user authentication scheme for smart home environment

Moneer Fakroon et al.

INTERNET OF THINGS (2020)

Article Computer Science, Information Systems

Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things

Binbin Yu et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)

Article Computer Science, Interdisciplinary Applications

Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems

Chun-Ta Li et al.

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2018)

Article Health Care Sciences & Services

An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing

Vinod Kumar et al.

JOURNAL OF MEDICAL SYSTEMS (2018)

Article Health Care Sciences & Services

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System

Prerna Mohit et al.

JOURNAL OF MEDICAL SYSTEMS (2017)

Article Health Care Sciences & Services

Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment

Shin-Yan Chiou et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks

Durga Prasad Sahoo et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis

Jeroen Delvaux et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2015)

Article Engineering, Electrical & Electronic

Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices

Debiao He et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)

Article Health Care Sciences & Services

A Secure Medical Data Exchange Protocol Based on Cloud Environment

Chin-Ling Chen et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Engineering, Electrical & Electronic

Physical Unclonable Functions and Applications: A Tutorial

Charles Herder et al.

PROCEEDINGS OF THE IEEE (2014)

Article Computer Science, Hardware & Architecture

Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices

Cheng-Chi Lee et al.

IET COMPUTERS AND DIGITAL TECHNIQUES (2013)

Article Computer Science, Hardware & Architecture

Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers

Daniel E. Holcomb et al.

IEEE TRANSACTIONS ON COMPUTERS (2009)

Article Computer Science, Theory & Methods

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Yevgeniy Dodis et al.

SIAM JOURNAL ON COMPUTING (2008)

Article Multidisciplinary Sciences

Physical one-way functions

R Pappu et al.

SCIENCE (2002)