相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Secure remote anonymous user authentication scheme for smart home environment
Moneer Fakroon et al.
INTERNET OF THINGS (2020)
Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things
Binbin Yu et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)
Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems
Chun-Ta Li et al.
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2018)
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing
Vinod Kumar et al.
JOURNAL OF MEDICAL SYSTEMS (2018)
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System
Prerna Mohit et al.
JOURNAL OF MEDICAL SYSTEMS (2017)
Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment
Shin-Yan Chiou et al.
JOURNAL OF MEDICAL SYSTEMS (2016)
A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks
Durga Prasad Sahoo et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2015)
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
Jeroen Delvaux et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2015)
Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices
Debiao He et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)
A Secure Medical Data Exchange Protocol Based on Cloud Environment
Chin-Ling Chen et al.
JOURNAL OF MEDICAL SYSTEMS (2014)
Physical Unclonable Functions and Applications: A Tutorial
Charles Herder et al.
PROCEEDINGS OF THE IEEE (2014)
Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices
Cheng-Chi Lee et al.
IET COMPUTERS AND DIGITAL TECHNIQUES (2013)
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
Daniel E. Holcomb et al.
IEEE TRANSACTIONS ON COMPUTERS (2009)
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Yevgeniy Dodis et al.
SIAM JOURNAL ON COMPUTING (2008)