Cargando…
P/Key: PUF based second factor authentication
One-time password (OTP) mechanisms are widely used to strengthen authentication processes. In time-based one-time password (TOTP) mechanisms, the client and server store common secrets. However, once the server is compromised, the client’s secrets are easy to obtain. To solve this issue, hash-chain-...
Autores principales: | Uysal, Ertan, Akgün, Mete |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9910660/ https://www.ncbi.nlm.nih.gov/pubmed/36758004 http://dx.doi.org/10.1371/journal.pone.0280181 |
Ejemplares similares
-
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
por: Sun, Da-Zhi, et al.
Publicado: (2023) -
Authenticated communication from quantum readout of PUFs
por: Škorić, Boris, et al.
Publicado: (2017) -
An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space–Air–Ground Integrated Network
por: Xu, Liwei, et al.
Publicado: (2023) -
A Lightweight RFID Mutual Authentication Protocol with PUF
por: Zhu, Feng, et al.
Publicado: (2019) -
Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
por: Park, Yohan, et al.
Publicado: (2023)