Optimal tradeoff of secure PUF-based authentication.
Kittipong KittichokechaiGiuseppe CairePublished in: CNS (2015)
Keyphrases
- security analysis
- authentication scheme
- authentication mechanism
- identity management
- authentication protocol
- user authentication
- password authentication
- data encryption
- dynamic programming
- security requirements
- worst case
- computational complexity
- private key
- image authentication
- lightweight
- identity authentication
- integrity verification
- factor authentication