The Authentication and Key Management Method based on PUF for Secure USB
暂无分享,去创建一个
[1] Minho Kim,et al. Vulnerability Analysis Method of Software-based Secure USB , 2012 .
[2] Seong-Moo Yoo,et al. An AES crypto chip using a high-speed parallel pipelined architecture , 2005, Microprocess. Microsystems.
[3] Dongho Won,et al. Analysis on Vulnerability of Secure USB Flash Drive and Development Protection Profile based on Common Criteria Version 3.1 , 2007 .
[4] Minho Park,et al. OTP-Based Transaction Verification Protocol Using PUFs , 2013 .
[5] Souhwan Jung,et al. HRP: A HMAC-based RFID mutual authentication protocol using PUF , 2013, The International Conference on Information Networking 2013 (ICOIN).
[6] Im-Yeong Lee,et al. A Study on Security Solution for USB Flash Drive , 2010 .
[7] Im-Yeong Lee,et al. The Study on The Security Solutions of USB Memory , 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications.
[8] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.