Login / Signup
Refillable PUF authentication protocol for constrained devices.
Arthur Desuert
Stéphanie Chollet
Laurent Pion
David Hély
Published in:
J. Ambient Intell. Smart Environ. (2022)
Keyphrases
</>
authentication protocol
electronic devices
rfid tags
smart card
security analysis
lightweight
security protocols
mobile devices
rfid systems
public key
smart phones
embedded systems
hash functions
password authentication
secret key
data access
authentication mechanism