These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
131 related articles for article (PubMed ID: 36758004)
1. P/Key: PUF based second factor authentication. Uysal E; Akgün M PLoS One; 2023; 18(2):e0280181. PubMed ID: 36758004 [TBL] [Abstract][Full Text] [Related]
2. An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree. Yin X; He J; Guo Y; Han D; Li KC; Castiglione A Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33050225 [TBL] [Abstract][Full Text] [Related]
3. Designing secure PUF-based authentication protocols for constrained environments. Lee SW; Safkhani M; Le Q; Ahmed OH; Hosseinzadeh M; Rahmani AM; Bagheri N Sci Rep; 2023 Dec; 13(1):21702. PubMed ID: 38066003 [TBL] [Abstract][Full Text] [Related]
4. On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices. Sun DZ; Gao YN; Tian Y Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514853 [TBL] [Abstract][Full Text] [Related]
5. A Lightweight RFID Mutual Authentication Protocol with PUF. Zhu F; Li P; Xu H; Wang R Sensors (Basel); 2019 Jul; 19(13):. PubMed ID: 31277487 [TBL] [Abstract][Full Text] [Related]
6. Verifier-based anonymous password-authenticated key exchange protocol in the standard model. Zhang QH; Chaudhary P; Kumari S; Kong ZY; Liu WF Math Biosci Eng; 2019 Apr; 16(5):3623-3640. PubMed ID: 31499629 [TBL] [Abstract][Full Text] [Related]
7. Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks. Najafi F; Kaveh M; Martín D; Reza Mosavi M Sensors (Basel); 2021 Mar; 21(6):. PubMed ID: 33809161 [TBL] [Abstract][Full Text] [Related]
8. Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak. Braeken A Sensors (Basel); 2020 Apr; 20(8):. PubMed ID: 32290358 [TBL] [Abstract][Full Text] [Related]
10. A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS. Amin R; Biswas GP J Med Syst; 2015 Mar; 39(3):33. PubMed ID: 25681100 [TBL] [Abstract][Full Text] [Related]
11. Password-only authenticated three-party key exchange with provable security in the standard model. Nam J; Choo KK; Kim J; Kang HK; Kim J; Paik J; Won D ScientificWorldJournal; 2014; 2014():825072. PubMed ID: 24977229 [TBL] [Abstract][Full Text] [Related]
12. PUFchain 2.0: Hardware-Assisted Robust Blockchain for Sustainable Simultaneous Device and Data Security in Smart Healthcare. Bathalapalli VKVV; Mohanty SP; Kougianos E; Baniya BK; Rout B SN Comput Sci; 2022; 3(5):344. PubMed ID: 35755326 [TBL] [Abstract][Full Text] [Related]
13. A robust and effective smart-card-based remote user authentication mechanism using hash function. Das AK; Odelu V; Goswami A ScientificWorldJournal; 2014; 2014():719470. PubMed ID: 24892078 [TBL] [Abstract][Full Text] [Related]
14. Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices. Mostafa A; Lee SJ; Peker YK Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32764285 [TBL] [Abstract][Full Text] [Related]
15. A Novel RFID Authentication Protocol Based on Reconfigurable RRAM PUF. Ren Q; Fu X; Wu H; Yang K; Lei D; Xing G; Zhang F Micromachines (Basel); 2021 Dec; 12(12):. PubMed ID: 34945410 [TBL] [Abstract][Full Text] [Related]
16. Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication. Abdel Hakeem SA; Kim H Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009873 [TBL] [Abstract][Full Text] [Related]
17. A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks. Hakeem SAA; El-Kader SMA; Kim H Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502729 [TBL] [Abstract][Full Text] [Related]
18. A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication. Obaidat M; Brown J; Obeidat S; Rawashdeh M Sensors (Basel); 2020 Jul; 20(15):. PubMed ID: 32751189 [TBL] [Abstract][Full Text] [Related]
19. A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC. Qi M; Chen J; Chen Y Comput Methods Programs Biomed; 2018 Oct; 164():101-109. PubMed ID: 30195418 [TBL] [Abstract][Full Text] [Related]
20. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge. Pardeshi MS; Sheu RK; Yuan SM Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]