Fortifying Strong PUFs: A Modeling Attack-Resilient Approach Using Weak PUF for IoT Device Security.
Sara AlahmadiKasem KhalilHaytham IdrissMagdy A. BayoumiPublished in: ISCAS (2024)
Keyphrases
- electronic devices
- security problems
- security measures
- cyber attacks
- denial of service attacks
- key management
- management system
- authentication protocol
- intrusion detection
- key exchange protocol
- cloud computing
- fault injection
- countermeasures
- computer security
- encryption algorithm
- security mechanisms
- security issues
- security policies
- network security
- access control