共 17 条
[1]
SAXENA V, A survey on IoT security:application areas,security threats,and solution architectures[J].IEEE Access, 7, pp. 82721-82743, (2019)
[2]
NOOR S, HASAN R., HSC-IoT:a hardware and software co-verification based authentication scheme for Internet of Things, 2017 5th IEEE International Conference on Mobile Cloud Computing,Services,and Engineering(Mobile Cloud), pp. 109-116, (2017)
[3]
ZHOU L, YEH K H, Lightweight IoT-based authentication scheme in cloud computing circumstance[J], Future Generation Computer Systems, 91, pp. 244-251, (2019)
[4]
WANG X, JIA Q X,, GAO X, Provable security lightweight service-less RFID security search protocol[J], Journal of Hunan University(Natural Sciences), 41, 8, pp. 117-124, (2014)
[5]
CHENG Y Q, Bio-AKA:an efficient fingerprint based two factor user authentication and key agreement scheme[J], Future Generation Computer Systems, 109, pp. 45-55, (2020)
[6]
HU J, Design of miniature image acquisition system based on low power system on chip[J], Journal of Hunan University(Natural Sciences), 46, 2, pp. 86-91, (2019)
[7]
Remanence decay side-channel:the PUF case[J], IEEE Transactions on Information Forensics and Security, 11, 6, pp. 1106-1116, (2016)
[8]
CHANG C H,, ZHENG Y, ZHANG L., A retrospective and a look forward:fifteen years of physical unclonable function advancement [J], IEEE Circuits and Systems Magazine, 17, 3, pp. 32-62, (2017)
[9]
A lockdown technique to prevent machine learning on PUFs for lightweight authentication [J], IEEE Transactions on Multi-Scale Computing Systems, 2, 3, pp. 146-159, (2016)
[10]
HUANG Z, WANG Q., A PUF-based unified identity verification framework for secure IoT hardware via device authentication[J].World Wide Web, 23, 2, pp. 1057-1088, (2020)