ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
1
views
0
references
Top references
cited by
1
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,768
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
A PUF-based destructive private mutual authentication RFID protocol
Author(s):
Publication date:
2018
Read this book at
Bookmark
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Data availability:
Comments
Comment on this book
Sign in to comment
Similar content
3,768
A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation
Authors:
Prosanta Gope
,
Biplab Sikdar
,
P. Gope
…
Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs
Authors:
Mohammed Saeed Alkatheiri
,
Yu Zhuang
Integrating the supply chain with RFID: a technical and business analysis
Authors:
Z ASIF
,
M Mandviwalla
See all similar
Cited by
1
Challenging the security of “A PUF-based hardware mutual authentication protocol”
Authors:
Morteza Adeli
,
Nasour Bagheri
,
Honorio Martín
…
See all cited by