[1] Kuo C, Luk M, Negi R, et al. Message-in-a-bottle: User-friendly and Security Key Deployment for Sensor Nodes[C]//International Conference on Embedded Networked Sensor Systems-Sensys. New York: ACM, 2007: 233-246.
[2] Canetti R. Universally Composable Security: a New Paradigm for Cryptographic Protocols [C]//Proceedings of the 42nd IEEE Symposium on the FOCS. New York: IEEE Computer Society Press, 2001: 136-145.
[3] Canetti R, Herzog J. Universally Composable Symbolic Security Analysis[J]. Journal of Cryptology, 2011, 24(1): 83-147.
[4] Pappu R S. Physical One-Way Functions[D]. Massachusetts: Massachusetts Institute of Technology, 2001.
[5] Dodis Y, Ostrovsky R, Reyzin L, et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data[J]. SIAM Journal of Computing, 2008, 38(1): 97-139.
[6] Duan Xiaoyi, Li Xiuying. Security of a New Password Authentication Scheme Using Fuzzy Extractor with Smart Card[C]//IEEE 3rd International Conference on Communication Software and Networks. Piscataway: IEEE, 2011: 282-284.
[7] Ju J, Plusquellic J, Chakraborty R, et al. Bit String Analysis of Physical Unclonable Functions Based on Resistance Variations in Metals and Transistors[C]//IEEE International Symposium on Hardware-Oriented Security and Trust. Piscataway: IEEE, 2012: 13-20.
[8] Stanzione S, Puntin D, Iannaccone G. CMOS Silicon Physical Unclonable Functions Based on Intrinsic Process Variability[J]. IEEE Journal of Solid-State Circuits, 2011, 46(6): 1456-1463.
[9] Lahiri D K, Maloney B, Rogers J T, et al. PuF, An Antimetastatic and Developmental Signaling Protein, Interacts with the Alzheimer's Amyloid-β Precursor Protein via a Tissue-specific Proximal Regulatory Element(PRE)[J]. BMC Genomics, 2013, 14(1): 68.
[10] Friend K, Campbell Z T, Cooke A, et al. A Conserved PUF-Ago-eEF1A Complex Attenuates Translation Elongation[J]. Nature Structural & Molecular Biology, 2012, 19(2): 176-183.
[11] Qiu C, Kershner A, Wang Y, et al. Divergence of Pumilio/fem-3 mRNA Binding Factor (PUF) Protein Specificity through Variations in an RNA-binding Pocket[J]. Journal of Biological Chemistry, 2012, 287(9): 6949-6957.
[12] Katzenbeisser S, Kocabas U, Rozic V, et al. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version)[C]//Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2012: 283-301.
[13] Hori Y,Kang H, Katashita T. Pseudo-LFSR PUF: A Compact, Efficient and Reliable Physical Unclonable Function[C]//International Conference on Reconfigurable Computing and FPGAs. Piscataway: IEEE, 2011: 223-228.
[14] Maiti A, McDougall L, Schaumont P. The Impact of Aging on an FPGA-based Physical Unclonable Function[C]//International Conference on Field Programmable Logic and Applications. Piscataway: IEEE, 2011: 151-156.
[15] 彭清泉, 裴庆祺, 杨超, 等. 通用可组合安全的 Internet 密钥交换协议[J]. 西安电子科技大学学报, 2009, 36(4): 714-720.
Peng Qingquan, Pei Qingqi, Yang Chao, et al. Universally Composable Secure Internet Key Exchange Protocol[J]. Journal of Xidian University, 2009, 36(4): 714-720. |