Author of the publication

Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices.

, , , , and . Comput. Commun., (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Golden-Chip-Free Hardware Trojan Detection Through Quiescent Thermal Maps., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (12): 2872-2883 (2019)A Lightweight LFSR-Based Strong Physical Unclonable Function Design on FPGA., , and . IEEE Access, (2019)The "G-F" 2-Valued Formula Generating Complete Set of Tests to Multiple Faults., and . VLSI Design, page 343-349. IEEE Computer Society, (1992)SYENet: A Simple Yet Effective Network for Multiple Low-Level Vision Tasks with Real-time Performance on Mobile Device., , , , , , and . ICCV, page 12148-12161. IEEE, (2023)Microsecond-Level Temperature Variation of Logic Circuits and Influences of Infrared Cameras' Parameters on Hardware Trojans Detection., , , , and . NCCET, volume 666 of Communications in Computer and Information Science, page 69-80. Springer, (2016)A dynamically configurable LFSR-based PUF design against machine learning attacks., , , , , and . CCF Trans. High Perform. Comput., 3 (1): 31-56 (2021)A lightweight and secure-enhanced Strong PUF design on FPGA., , , , and . IEICE Electron. Express, 16 (24): 20190695 (2019)Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices., , , , and . Comput. Commun., (April 2023)Part I: Evaluation for Hardware Trojan Detection Based on Electromagnetic Radiation., , , and . J. Electron. Test., 36 (5): 591-606 (2020)Thermal maps based HT detection using spatial projection transformation., , , and . IET Inf. Secur., 12 (4): 356-361 (2018)