{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T09:40:06Z","timestamp":1746351606599,"version":"3.40.4"},"publisher-location":"Cham","reference-count":71,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319098845"},{"type":"electronic","value":"9783319098852"}],"license":[{"start":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T00:00:00Z","timestamp":1408665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T00:00:00Z","timestamp":1408665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-09885-2_19","type":"book-chapter","created":{"date-parts":[[2014,8,21]],"date-time":"2014-08-21T16:49:14Z","timestamp":1408639754000},"page":"345-363","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Smart User Authentication for an Improved Data Privacy"],"prefix":"10.1007","author":[{"given":"Vanesa","family":"Daza","sequence":"first","affiliation":[]},{"given":"Matteo","family":"Signorini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,22]]},"reference":[{"key":"19_CR1","unstructured":"Rivera, J., van der Meulen, R.: Gartner says worldwide PC, tablet and mobile phone combined shipments to reach 2.4 billion units in 2013 @ONLINE. http:\/\/www.gartner.com\/newsroom\/id\/2408515. Accessed April 2013"},{"key":"19_CR2","unstructured":"CASRO: Global research business network study reveals widespread concern over personal data security @ONLINE. https:\/\/www.casro.org\/news\/162258\/GRBN-Study-Reveals-Widespread-Concern-Over-Personal-Data-Security.htm. Accessed Feb 2014"},{"key":"19_CR3","unstructured":"Harjula, J.: Consumers concerned about privacy, but willing to share information with trusted telecoms operators @ONLINE. http:\/\/nsn.com\/news-events\/press-room\/press-releases\/consumers-concerned-about-privacy-but-willing-to-share-informa. Accessed Feb 2011"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Henson, M., Taylor, S.: Memory encryption: a survey of existing techniques. ACM Comput. Surv. (CSUR) 46(4), 53:1\u201353:26 (2014)","DOI":"10.1145\/2566673"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Martin, L.: Key-management infrastructure for protecting stored data. Computer 41(6), 103\u2013104 (2008)","DOI":"10.1109\/MC.2008.197"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Lei, S., Zishan, D., Jindi, G.: Research on key management infrastructure in cloud computing environment. In: 9th International Conference on Grid and Cooperative Computing (GCC), pp. 404\u2013407, Nov 2010","DOI":"10.1109\/GCC.2010.84"},{"key":"19_CR7","unstructured":"Ma, Z., Qiao, Y., Lee, B., Fallon, E.: Experimental evaluation of mobile phone sensors. In: 24th IET Irish Signals and Systems Conference (ISSC), pp. 1\u20138, June 2013"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Dass, S.C., Zhu, Y., Jain, A.K.: Validating a biometric authentication system: sample size requirements. IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 1902\u20131319 (2006)","DOI":"10.1109\/TPAMI.2006.255"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2000: fingerprint verification competition. IEEE Trans. Pattern Anal. Mach. Intell. 24(3), 402\u2013412 (2002)","DOI":"10.1109\/34.990140"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, Y.-L., Yang, J., Wu, H.-T.: Sweep fingerprint sequence reconstruction for portable devices. Electron Lett 42(4), 204\u2013205 (2006)","DOI":"10.1049\/el:20063683"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Monro, D.M., Rakshit, S., Zhang, D.: DCT-based iris recognition. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 586\u2013595 (2007)","DOI":"10.1109\/TPAMI.2007.1002"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"O\u2019Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021\u20132040 (2003)","DOI":"10.1109\/JPROC.2003.819611"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Lu, H., Brush, A.J.B., Priyantha, B., Karlson, A.K., Liu, J.: SpeakerSense: energy efficient unobtrusive speaker identification on mobile phones. In: Lyons, K., Hightower, J., Huang, E.M. (eds.) Pervasive Computing, Volume 6696 of Lecture Notes in Computer Science, pp. 188\u2013205. Springer, Berlin Heidelberg (2011)","DOI":"10.1007\/978-3-642-21726-5_12"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Clarke, N., Karatzouni, S., Furnell, S.: Flexible and transparent user authentication for mobile devices. In: Gritzalis, D., Lopez, J. (eds.) Emerging Challenges for Security. Privacy and Trust, Volume 297 of IFIP Advances in Information and Communication Technology, pp. 1\u201312. Springer, Berlin Heidelberg (2009)","DOI":"10.1007\/978-3-642-01244-0_1"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Lin, C.-C., Liang, D., Chang, C.-C., Yang, C.-H.: A new non-intrusive authentication method based on the orientation sensor for smartphone users. In: IEEE Sixth International Conference on Software Security and Reliability (SERE), pp. 245\u2013252, June 2012","DOI":"10.1109\/SERE.2012.37"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Lin, C.-C., Chang, C.-C., Liang, D.: A new non-intrusive authentication approach for data protection based on mouse dynamics. In: International Symposium on Biometrics and Security Technologies (ISBAST), pp. 9\u201314, March 2012","DOI":"10.1109\/ISBAST.2012.11"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Derawi, M.O., Bours, P., Holien, K.: Improved cycle detection for accelerometer based gait authentication. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 312\u2013317, Oct 2010","DOI":"10.1109\/IIHMSP.2010.84"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Gafurov, D., Helkala, K., S\u00f8ndrol, T.: Biometric gait authentication using accelerometer sensor. J. Comput. 1(7), 9 (2006)","DOI":"10.4304\/jcp.1.7.51-59"},{"issue":"5","key":"19_CR19","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1108\/09685220510627269","volume":"13","author":"O Mazhelis","year":"2005","unstructured":"Mazhelis, O., Markkula, J., Veijalainen, J.: An integrated identity verification system for mobile terminals. Inf. Manage. Comput. Secur. 13(5), 367\u2013378 (2005)","journal-title":"Inf. Manage. Comput. Secur."},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS\u201911, pp. 249\u2013259. ACM, New York, NY, USA (2011)","DOI":"10.1145\/1966913.1966945"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Shi, W., Yang, J., Jiang, Y., Yang, F., Xiong, Y.: SenGuard: passive user identification on smartphones using multiple sensors. In: IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 141\u2013148, Oct 2011","DOI":"10.1109\/WiMOB.2011.6085412"},{"key":"19_CR22","unstructured":"Riva, O., Qin, C., Strauss, K., Lymberopoulos, D.: Progressive authentication: deciding when to authenticate on mobile phones. In: Proceedings of 21st USENIX Security Symposium, 2012"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Zargarzadeh, M., Maghooli, K.: A behavioral biometric authentication system based on memory game. Biosci. Biotechnol. Res. Asia 10(2), 781\u2013787 (2013)","DOI":"10.13005\/bbra\/1196"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Misra, S.: A very simple user access control technique through smart device authentication using bluetooth communication. In: International Conference on Electronics, Communication and Instrumentation (ICECI), pp. 1\u20134. IEEE (2014)","DOI":"10.1109\/ICECI.2014.6767369"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Kang, J., Nyang, D., Lee, K.: Two-factor face authentication using matrix permutation transformation and a user password. Inf. Sci. 269, 1\u201320 (2014)","DOI":"10.1016\/j.ins.2014.02.011"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Luo, S., Hu, J., Chen, Z.: An identity-based one-time password scheme with anonymous authentication. In: International Conference on Networks Security, Wireless Communications and Trusted Computing, (NSWCTC), vol. 2, pp. 864\u2013867, April 2009","DOI":"10.1109\/NSWCTC.2009.287"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"R.G.M.M., Jayamaha, Senadheera, M.R.R., Gamage, T.N.C., Weerasekara, K.D.P.B., Dissanayaka, G.A., Nuwan Kodagoda, G.: VoizLock\u2014human voice authentication system using hidden markov model. In: 4th International Conference on Information and Automation for Sustainability (ICIAFS), pp. 330\u2013335, Dec 2008","DOI":"10.1109\/ICIAFS.2008.4783977"},{"key":"19_CR28","unstructured":"Moore, C., King, B.M., Vieta, W.M., Tu, X., Piemonte, P.: Calibrating sensor measurements on mobile devices, Jan 2014. US Patent 8,626,465 (2014)"},{"issue":"1","key":"19_CR29","first-page":"1","volume":"8","author":"D Charoen","year":"2014","unstructured":"Charoen, D.: Password security. Int. J. Secur. (IJS) 8(1), 1 (2014)","journal-title":"Int. J. Secur. (IJS)"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Clair, L.S., Johansen, L., Enck, W., Pirretti, M., Traynor, P., McDaniel, P., Jaeger, T.: Password exhaustion: predicting the end of password usefulness. In: Proceedings of the Second International Conference on Information Systems Security, ICISS\u201906, pp. 37\u201355. Springer, Berlin, Heidelberg (2006)","DOI":"10.1007\/11961635_3"},{"key":"19_CR31","unstructured":"Eli \u201cthe Computer Guy\u201d: Online hash cracking in the cloud with Cloud Cracker @ONLINE. http:\/\/www.elithecomputerguy.com\/2013\/03\/25\/online-hash-cracking-in-the-cloud-with-cloud-cracker\/. Accessed Mar 2013"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Vishwakarma, D., Veni Madhavan, C.E.: Efficient dictionary for salted password analysis. In: IEEE International Conference on Electronics, Computing and Communication Technologies (IEEE CONECCT), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/CONECCT.2014.6740293"},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Sharma, N., Rathi, R., Jain, V., Waseem Saifi, M.: A novel technique for secure information transmission in videos using salt cryptography. In: Nirma University International Conference on Engineering (NUiCONE), pp. 1\u20136, Dec 2012","DOI":"10.1109\/NUICONE.2012.6493212"},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Fujioka, A., Okamoto, Y., Saito, T.: Security of sequential multiple encryption. In: Proceedings of the First International Conference on Progress in Cryptology: Cryptology and Information Security in Latin America, LATINCRYPT\u201910, pp. 20\u201339. Springer, Berlin, Heidelberg (2010)","DOI":"10.1007\/978-3-642-14712-8_2"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Kemshall, A.: Feature: why mobile two-factor authentication makes sense. Netw. Secur. 2011(4), 9\u201312 (2011)","DOI":"10.1016\/S1353-4858(11)70038-1"},{"key":"19_CR36","doi-asserted-by":"crossref","unstructured":"Lu, H.K., Ali, A.: Communication security between a computer and a hardware token. In: Third International Conference on Systems (ICONS), pp. 220\u2013225, April 2008","DOI":"10.1109\/ICONS.2008.36"},{"key":"19_CR37","doi-asserted-by":"crossref","unstructured":"Li, N., Sharif Mansouri, S., Dubrova, E.: Secure key storage using state machines. In: IEEE 43rd International Symposium on Multiple-Valued Logic (ISMVL), pp. 290\u2013295, May 2013","DOI":"10.1109\/ISMVL.2013.50"},{"key":"19_CR38","doi-asserted-by":"crossref","unstructured":"Kalman, G., Noll, J.: SIM as secure key storage in communication networks. In: Third International Conference on Wireless and Mobile Communications (ICWMC), pp. 55\u201355, March 2007","DOI":"10.1109\/ICWMC.2007.82"},{"key":"19_CR39","doi-asserted-by":"crossref","unstructured":"Gallo, R., Kawakami, H., Dahab, R.: Case study: on the security of key storage on PCs. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1645\u20131651, July 2013","DOI":"10.1109\/TrustCom.2013.203"},{"key":"19_CR40","doi-asserted-by":"crossref","unstructured":"Seok, M., Hanson, S., Seo, J.-S., Sylvester, D., Blaauw, D.: Robust ultra-low voltage ROM design. In: IEEE Custom Integrated Circuits Conference (CICC), pp. 423\u2013426 (2008)","DOI":"10.1109\/CICC.2008.4672110"},{"key":"19_CR41","doi-asserted-by":"crossref","unstructured":"Ebrard, E., Allard, B., Candelier, P., Waltz, P.: Review of fuse and antifuse solutions for advanced standard CMOS technologies. Microelectron. J. 40(12), 1755\u20131765 (2009)","DOI":"10.1016\/j.mejo.2009.09.007"},{"issue":"5","key":"19_CR42","doi-asserted-by":"publisher","first-page":"799","DOI":"10.3938\/jkps.61.799","volume":"61","author":"J-H Yoon","year":"2012","unstructured":"Yoon, J.-H.: Memory properties of AI-based nanoparticle floating gate for nonvolatile memory applications. J. Korean Phys. Soc. 61(5), 799\u2013802 (2012)","journal-title":"J. Korean Phys. Soc."},{"key":"19_CR43","doi-asserted-by":"crossref","unstructured":"Wu, M., Willy, Z.: eNVy: a non-volatile, main memory storage system. SIGPLAN Not. 29(11), 86\u201397 (1994)","DOI":"10.1145\/195470.195506"},{"key":"19_CR44","unstructured":"Prochnow, D.: Experiments with EPROMS. McGraw-Hill Professional, New York (1988)"},{"key":"19_CR45","doi-asserted-by":"crossref","unstructured":"Kratochvil, B.E., Dong, L., Nelson, B.J.: Real-time rigid-body visual tracking in a scanning electron microscope. In: 7th IEEE Conference on Nanotechnology (IEEE-NANO), vol. 28(4), pp. 498\u2013511, April 2009","DOI":"10.1177\/0278364908099849"},{"key":"19_CR46","doi-asserted-by":"crossref","unstructured":"Korosec, M., Duhovnik, J., Vukasinovic, N.: Identification and optimization of key process parameters in noncontact laser scanning for reverse engineering. Comput. Aided Des. 42(8), 744\u2013748 (2010)","DOI":"10.1016\/j.cad.2010.02.003"},{"key":"19_CR47","unstructured":"Murthy, M.S.N., Jones, M.G., Kulka, J., Davies, J.D., Halliwell, M., Jackson, P.C., Bull, D.R., Wells, P.N.T.: Infrared confocal microscope. In: IEEE Colloquium on New Microscopies in Medicine and Biology, pp. 1\u20132 (1994)"},{"issue":"2","key":"19_CR48","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1116\/1.583937","volume":"5","author":"J Melngailis","year":"1987","unstructured":"Melngailis, J.: Focused ion beam technology and applications. J. Vac. Sci. Technol. B Microelectron. Nanometer Struct. 5(2), 469\u2013495 (1987)","journal-title":"J. Vac. Sci. Technol. B Microelectron. Nanometer Struct."},{"key":"19_CR49","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.-R., Naccache, D.: Towards Hardware-Intrinsic Security: Foundations and Practice, 1st edn. Springer-Verlag New York Inc, New York (2010)","DOI":"10.1007\/978-3-642-14452-3"},{"issue":"5589","key":"19_CR50","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026\u20132030 (2002)","journal-title":"Science"},{"key":"19_CR51","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM conference on Computer and communications security, CCS\u201902, pp. 148\u2013160. ACM, New York, NY, USA (2002)","DOI":"10.1145\/586110.586132"},{"key":"19_CR52","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 44th ACM\/IEEE, Design Automation Conference 2007 DAC\u201907, pp. 9\u201314, June 2007","DOI":"10.1109\/DAC.2007.375043"},{"key":"19_CR53","doi-asserted-by":"crossref","unstructured":"van der Leest, V., Tuyls, P.: Anti-counterfeiting with hardware intrinsic security. In: Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1137\u20131142 (2013)","DOI":"10.7873\/DATE.2013.238"},{"key":"19_CR54","doi-asserted-by":"crossref","unstructured":"Handschuh, H.: Hardware intrinsic security based on SRAM PUFs: tales from the industry. In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 127\u2013127 (2011)","DOI":"10.1109\/HST.2011.5955009"},{"key":"19_CR55","doi-asserted-by":"crossref","unstructured":"Rose, G.S., Rajendran, J., McDonald, N., Karri, R., Potkonjak, M., Wysocki, B.: Hardware security strategies exploiting nanoelectronic circuits. In: 18th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 368\u2013372 (2013)","DOI":"10.1109\/ASPDAC.2013.6509623"},{"key":"19_CR56","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Testing techniques for hardware security. In: IEEE International Test Conference (ITC), pp. 1\u201310 (2008)","DOI":"10.1109\/TEST.2008.4700636"},{"key":"19_CR57","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium on VLSI Circuits, Digest of Technical Papers, pp. 176\u2013179, June 2004"},{"key":"19_CR58","doi-asserted-by":"crossref","unstructured":"Ozturk, E., Hammouri, G., Sunar, B.: Towards robust low cost authentication for pervasive devices. In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 170\u2013178, March 2008","DOI":"10.1109\/PERCOM.2008.54"},{"key":"19_CR59","doi-asserted-by":"crossref","unstructured":"Lin, L., Holcomb, D., Krishnappa, D.K., Shabadi, P., Burleson, W.: Low-power sub-threshold design of secure physical unclonable functions. In: ACM\/IEEE International Symposium on Low-Power Electronics and Design (ISLPED), pp. 43\u201348, Aug 2010","DOI":"10.1145\/1840845.1840855"},{"key":"19_CR60","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES\u201907, pp. 63\u201380. Springer-Verlag, Berlin, Heidelberg (2007)","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"19_CR61","doi-asserted-by":"crossref","unstructured":"Holcomb, D.E., Burleson, W.P., Kevin, F.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58(9), 1198\u20131210 (2009)","DOI":"10.1109\/TC.2008.212"},{"key":"19_CR62","doi-asserted-by":"crossref","unstructured":"van der Leest, V., Schrijen, G.-J., Handschuh, H., Tuyls, P.: Hardware intrinsic security from D flip-flops. In: Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC\u201910, pp. 53\u201362. ACM, New York, NY, USA (2010)","DOI":"10.1145\/1867635.1867644"},{"key":"19_CR63","unstructured":"Su, Y., Holleman, J., Otis, B.P.: A 1.6pJ\/bit 96 variations. In: IEEE International Solid-State Circuits Conference (ISSCC), pp. 406\u2013611, Feb 2007"},{"key":"19_CR64","doi-asserted-by":"crossref","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.-J., Tuyls, P.: Extended abstract: the butterfly PUF protecting IP on every FPGA. In: IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 67\u201370, June 2008","DOI":"10.1109\/HST.2008.4559053"},{"key":"19_CR65","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Ko\u00e7abas, \u00dc., van der Leest, V., Sadeghi, A.-R., Schrijen, G.-J., Schr\u00f6der, H., Wachsmann, C.: Recyclable PUFs: logically reconfigurable PUFs. In: Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems, CHES\u201911, pp. 374\u2013389. Springer-Verlag, Berlin, Heidelberg (2011)","DOI":"10.1007\/978-3-642-23951-9_25"},{"key":"19_CR66","doi-asserted-by":"crossref","unstructured":"Kursawe, K., Sadeghi, A.-R., Schellekens, D., Skoric, B., Tuyls, P.: Reconfigurable physical unclonable functions\u2014enabling technology for tamper-resistant storage. In: Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, HST\u201909, pp. 22\u201329. IEEE Computer Society, Washington, DC, USA (2009)","DOI":"10.1109\/HST.2009.5225058"},{"key":"19_CR67","doi-asserted-by":"crossref","unstructured":"Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 13(10), 1200\u20131205 (2005)","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"19_CR68","unstructured":"Daza, V., Di Pietro, R., Lombardi, F., Signorini, M.: Fully off-line secure credits for mobile micro payments. Internal report"},{"key":"19_CR69","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","DOI":"10.1137\/060651380"},{"key":"19_CR70","doi-asserted-by":"crossref","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs. In: Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, CHES\u201909, pp. 332\u2013347. Springer-Verlag, Berlin, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04138-9_24"},{"key":"19_CR71","doi-asserted-by":"crossref","unstructured":"Yu, M.-D.M, M\u2019Raihi, D., Sowell, R., Devadas, S.: Lightweight and secure PUF key storage using limits of machine learning. In: Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems, CHES\u201911, pp. 358\u2013373. Springer-Verlag, Berlin, Heidelberg (2011)","DOI":"10.1007\/978-3-642-23951-9_24"}],"container-title":["Studies in Computational Intelligence","Advanced Research in Data Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09885-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T09:08:56Z","timestamp":1746349736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09885-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,22]]},"ISBN":["9783319098845","9783319098852"],"references-count":71,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09885-2_19","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,8,22]]},"assertion":[{"value":"22 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}