Login / Signup
P2M-based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices.
Paul A. Wortman
Wei Yan
John A. Chandy
Fatemeh Tehranipoor
Published in:
IET Comput. Digit. Tech. (2018)
Keyphrases
</>
electronic devices
security model
access control
security requirements
public key
security analysis
intrusion detection
smart phones
security issues
random number generator
end users
software engineering
privacy preserving
security architecture