[1] |
马巧梅 . 物联网安全与隐私保护研究[J]. 微处理机, 2014,35(2):32-34.
|
|
MA Qiaomei . Research on Security and Privacy Protection of Internet of Things[J]. Microprocessors, 2014,35(2):32-34.
|
[2] |
武传坤 . 物联网安全关键技术与挑战[J]. 密码学报, 2015,2(1):40-53.
|
|
WU Chuankun . An Overview on the Security Techniques and Challenges of the Internet of Things[J]. Journal of Cryptologic Research, 2015,2(1):40-53.
|
[3] |
ZHANG J L, LIN Y P, LYU Y Q , et al. A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-per-device Licensing[J]. IEEE Transactions on Information Forensics and Security, 2015,10(6):1137-1150.
|
[4] |
AMAN M N, SIKDAR B . ATT-Auth: a Hybrid Protocol for Industrial IoT Attestation with Authentication[J]. IEEE Internet of Things Journal, 2018,5(6):5119-5131.
|
[5] |
刘博雅, 张悦, 杨亚涛 , 等. 基于PUF函数的轻量级双向认证协议[J]. 计算机工程, 2019,45(2):38-41.
doi: 10.19678/j.issn.1000-3428.0049344
|
|
LIU Boya, ZHANG Yue, YANG Yatao , et al. Lightweight Mutual Authentication Protocol Based on PUF Function[J]. Computer Engineering, 2019,45(2):38-41.
doi: 10.19678/j.issn.1000-3428.0049344
|
[6] |
张国栋, 刘强, 张齐军 . 用于FPGA IP保护的低成本高性能PUF设计[J]. 西安电子科技大学学报, 2016,43(6):97-102.
|
|
ZHANG Guodong, LIU Qiang, ZHANG Qijun . Low Cost and High Performance RO-PUF Design for IP Protection of FPGA Implementations[J]. Journal of Xidian University, 2016,43(6), 97-102.
|
[7] |
KUMAR S S, GUAJARDO J, MAES R, et al. The Butterfly PUF Protecting IP on Every FPGA[C]// Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust. Washington: IEEE Computer Society, 2008: 67-70.
|
[8] |
张紫楠, 郭渊博 . 物理不可克隆函数综述[J]. 计算机应用, 2012,32(11):3115-3120.
doi: 10.3724/SP.J.1087.2012.03115
|
|
ZHANG Zinan, GUO Yuanbo . Survey of Physical Unclonable Function[J]. Journal of Computer Applications, 2012,32(11):3115-3120.
doi: 10.3724/SP.J.1087.2012.03115
|
[9] |
USMANI M A, KESHAVARZ S, MATTHEWS E , et al. Efficient PUF-based Key Generation in FPGAs Using Per-device Configuration[J]. IEEE Transactions on Very Large Scale Integration Systems, 2019,27(2):364-375.
|
[10] |
YU T T, ZHU Y S. A New Water-marking Method for Soft IP Protection[C]// Proceedings of the 2011 International Conference on Consumer Electronics, Communications and Networks. Washington: IEEE Computer Society, 2011: 3839-3842.
|
[11] |
HAGHIGHI M M, ZAMANI M S. Soft IP Protection: an Active Approach Based on Hardware Authentication[C]// Proceedings of the 2016 24th Iranian Conference on Electrical Engineering. Piscataway: IEEE, 2016: 1049-1054.
|
[12] |
LAO Y J, YUAN B, KIM C H , et al. Reliable PUF-based Local Authentication with Self-correction[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2017,36(2):201-213.
|
[13] |
MISKELLY J, GU C Y, MA Q Q, et al. Modeling Attack Analysis of Configurable Ring Oscillator (CRO) PUF Designs[C]// Proceedings of 2018 the International Conference on Digital Signal Processing. Piscataway: IEEE, 2018: 8631638.
|
[14] |
DELVAUX J . Machine-learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF-FSMs[J]. IEEE Transactions on Information Forensics and Security, 2019,14(8):2043-2058.
|