Secure and private, yet lightweight, authentication for the IoT via PUF and CBKA
From MaRDI portal
Publication:2988331
Recommendations
- Concealing KETJE: a lightweight PUF-based privacy preserving authentication protocol
- Towards lightweight anonymous entity authentication for IoT applications
- End-to-end design of a PUF-based privacy preserving authentication protocol
- Secure lightweight entity authentication with strong PUFs: Mission impossible?
- Cloud-based lightweight secure RFID mutual authentication protocol in IoT
Cites work
- Advances in Cryptology - EUROCRYPT 2004
- End-to-end design of a PUF-based privacy preserving authentication protocol
- Information-theoretic key agreement: from weak to strong secret for free
- Randomness is linear in space
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
- Secret key agreement by public discussion from common information
- The internet of things: a survey
- Towards a Unified Security Model for Physically Unclonable Functions
Cited in
(7)- End-to-end design of a PUF-based privacy preserving authentication protocol
- X-lock: a secure XOR-based fuzzy extractor for resource constrained devices
- Towards lightweight anonymous entity authentication for IoT applications
- An efficient privacy-preserving scheme for weak password collection in Internet of Things
- Concealing KETJE: a lightweight PUF-based privacy preserving authentication protocol
- A lightweight authentication scheme for IoT against rogue base station attacks
- Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
This page was built for publication: Secure and private, yet lightweight, authentication for the IoT via PUF and CBKA
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2988331)