Login / Signup
PUF-Based Authentication Protocols - Revisited.
Heike Busch
Stefan Katzenbeisser
Paul Baecher
Published in:
WISA (2009)
Keyphrases
</>
authentication protocol
smart card
electronic devices
security analysis
lightweight
security protocols
public key
rfid tags
secret key
cryptographic protocols
ban logic
hash functions
rfid systems
security requirements
information security
e government
response time