PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart.
Karim LounisPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- security measures
- cyber attacks
- security vulnerabilities
- security issues
- countermeasures
- information security
- fault injection
- key exchange protocol
- denial of service attacks
- malicious users
- ddos attacks
- java card
- smart grid
- security requirements
- encryption algorithm
- access control
- security risks
- security management
- intrusion detection
- authentication protocol
- statistical databases
- biometric systems
- defense mechanisms
- dos attacks
- authentication mechanism
- network security
- security policies
- malicious nodes
- information leakage
- malicious attacks
- forensic analysis
- electronic devices
- security mechanisms
- block cipher
- security threats
- malicious activities
- encryption scheme
- key management
- computer security
- power system
- cyber security
- buffer overflow
- wireless sensor