Author of the publication

PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning.

, , , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks., and . Wireless Personal Communications, 94 (3): 467-479 (2017)Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks.. J. Inf. Secur. Appl., (2017)Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions., , , and . IEEE Consumer Electronics Magazine, 8 (3): 10-16 (2019)Design, analysis and implementation of a smart next generation secure shipping infrastructure using autonomous robot., , , and . Comput. Networks, (2021)Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap., , , , and . IEEE Access, (2021)Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices., and . IEEE Internet Things J., 6 (1): 580-589 (2019)An Effective LSTM-DDPM Scheme for Energy Theft Detection and Forecasting in Smart Grid., , , , and . CoRR, (2023)PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment., , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1095-1107 (2021)IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes., and . Secur. Commun. Networks, 8 (18): 3939-3952 (2015)The Language's Impact on the Enigma Machine., and . IACR Cryptol. ePrint Arch., (2021)