{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:54:20Z","timestamp":1743022460542,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819788002"},{"type":"electronic","value":"9789819788019"}],"license":[{"start":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T00:00:00Z","timestamp":1735084800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T00:00:00Z","timestamp":1735084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8801-9_8","type":"book-chapter","created":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T07:06:28Z","timestamp":1735023988000},"page":"151-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CoDPoC IP: A Configurable Data Protection Circuit to\u00a0Support Multiple Key Agreement Scheme"],"prefix":"10.1007","author":[{"given":"Yijing","family":"Peng","sequence":"first","affiliation":[]},{"given":"Junhui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhenbin","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yaohua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ding","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Shaoqing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,25]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Ula, M., Adek, R.T., et\u00a0al.: Towards the secure internet of things: threats and solution. In: Proceedings of Malikussaleh International Conference on Multidisciplinary Studies (MICoMS), vol.\u00a03, pp. 00029\u201300029 (2022)","DOI":"10.29103\/micoms.v3i.188"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Li, C., Liu, Z., Zhang, L., Ma, C., Zheng, L.: A PUF and software collaborative key protection scheme. In: International Conference on Information and Communications Security (2018)","DOI":"10.1007\/978-3-319-89500-0_26"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Li, D., Chen, Y., Zhang, S., Shen, W., Yang, G.: Hardware implementation of security association lookup device based on ram. In: 2020 IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom), pp. 379\u2013383. IEEE (2020)","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00073"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Kouty, S.Y.: Multilayer secure hardware network stack using FPGA. In: 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), pp. 439\u2013444. IEEE (2020)","DOI":"10.1109\/ISRITI51436.2020.9315502"},{"issue":"3","key":"8_CR5","doi-asserted-by":"publisher","first-page":"510","DOI":"10.3390\/en11030510","volume":"11","author":"M Urbina","year":"2018","unstructured":"Urbina, M., Moreira, N., Rodriguez, M., Acosta, T., L\u00e1zaro, J., Astarloa, A.: Secure protocol and IP core for configuration of networking hardware IPs in the smart grid. Energies 11(3), 510 (2018)","journal-title":"Energies"},{"key":"8_CR6","unstructured":"Ishwarappagol, M.A., Bagali, V.: An efficient design and implementation of securable RFID tag-reader mutual authentication protocol. IJSRD 3 (2015)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Adeli, M., Bagheri, N., Mart\u00edn, H., Peris-Lopez, P.: Challenging the security of a PUF-based hardware mutual authentication protocol. J. Parallel Distrib. Comput. 169, 199\u2013210 (2022)","DOI":"10.1016\/j.jpdc.2022.06.018"},{"issue":"1","key":"8_CR8","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","volume":"6","author":"P Gope","year":"2018","unstructured":"Gope, P., Sikdar, B.: Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J. 6(1), 580\u2013589 (2018)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"8_CR9","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1109\/TCAD.2020.3036807","volume":"40","author":"C Gu","year":"2020","unstructured":"Gu, C., Chang, C.H., Liu, W., Yu, S., Wang, Y., O\u2019Neill, M.: A modeling attack resistant deception technique for securing lightweight-PUF-based authentication. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6), 1183\u20131196 (2020)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Liu, W., Gu, C., Chang, C.H.: PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications. IEEE Trans. Dependable Secure Comput. (2022)","DOI":"10.36227\/techrxiv.14206568"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Hossain, M., Noor, S., Hasan, R.: HSC-IoT: a hardware and software co-verification based authentication scheme for internet of things. In: 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 109\u2013116. IEEE (2017)","DOI":"10.1109\/MobileCloud.2017.35"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Byun, J.W.: An efficient multi-factor authenticated key exchange with physically unclonable function. In: 2019 International Conference on Electronics, Information, and Communication (ICEIC) (2019)","DOI":"10.23919\/ELINFOCOM.2019.8706400"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_5"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Fu, D.E.H.P.B.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput., 1198\u20131210 (2009)","DOI":"10.1109\/TC.2008.212"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Pouraghily, A., Wolf, T.: Securing IoT protocol implementations through hardware monitoring. In: 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 467\u2013475. IEEE (2019)","DOI":"10.1109\/MASS.2019.00061"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Anandakumar, N.N., Sanadhya, S.K., Hashmi, M.S.: Design, implementation and analysis of efficient hardware-based security primitives. In: 2020 IFIP\/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC), pp. 198\u2013199. IEEE (2020)","DOI":"10.1109\/VLSI-SOC46417.2020.9344097"},{"key":"8_CR17","unstructured":"Delgado, M.\u00c1.P.: Design of hardware-based security solutions for interconnected systems. Ph.D. thesis, Universidad de Sevilla (2020)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Choi, J.B., Kim, D.S., Choe, J.Y., Shin, K.W.: Hardware implementation of ECIES protocol on security SoC. In: 2020 International Conference on Electronics, Information, and Communication (ICEIC), pp.\u00a01\u20134. IEEE (2020)","DOI":"10.1109\/ICEIC49074.2020.9051263"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Bermejo, \u00d3.G., Dik, D., Berger, M.S.: Risk assessment on hardware offloading architecture of network security protocols with Linux-based control plane. In: 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), pp.\u00a01\u20138. IEEE (2023)","DOI":"10.1109\/DRCN57075.2023.10108289"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Zniti, A., Ouazzani, N.: Hardware implementation of an enhanced security-and authentication-related automotive can bus prototype. Int. J. Electron. Telecommun. 69(1) (2023)","DOI":"10.24425\/ijet.2023.144335"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Lee, C.Y., Scott, K.R., Khatri, S.P., Ghrayeb, A.: A hardware validation framework for a networked dynamic multi-factor security protocol. In: 2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet), pp.\u00a01\u20137. IEEE (2023)","DOI":"10.1109\/CommNet60167.2023.10365286"},{"issue":"3","key":"8_CR22","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/TDSC.2018.2832201","volume":"16","author":"U Chatterjee","year":"2018","unstructured":"Chatterjee, U., et al.: Building PUF based authentication and key exchange protocol for IoT without explicit CRPS in verifier database. IEEE Trans. Dependable Secure Comput. 16(3), 424\u2013437 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Santana-Andreo, A., Saraza-Canflanca, P., Carrasco-Lopez, H., Brox, P., Castro-Lopez, R., Roca, E., Fernandez, F.V.: A DRV-based bit selection method for SRAM PUF key generation and its impact on ECCs. Integration: The VLSI J., 85 (2022)","DOI":"10.1016\/j.vlsi.2022.02.008"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Li, W., Li, X., Gao, J., Wang, H.: Design of secure authenticated key management protocol for cloud computing environments. IEEE Comput. Soc. (3) (2021)","DOI":"10.1109\/TDSC.2019.2909890"},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.comcom.2020.11.009","volume":"166","author":"P Gope","year":"2021","unstructured":"Gope, P., Millwood, O., Saxena, N.: A provably secure authentication scheme for RFID-enabled UAV applications. Comput. Commun. 166, 19\u201325 (2021)","journal-title":"Comput. Commun."},{"issue":"3","key":"8_CR26","first-page":"1095","volume":"18","author":"GS Poh","year":"2019","unstructured":"Poh, G.S., Gope, P., Ning, J.: PrivHome: privacy-preserving authenticated communication in smart home environment. IEEE Trans. Dependable Secure Comput. 18(3), 1095\u20131107 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8801-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T08:03:50Z","timestamp":1735027430000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8801-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,25]]},"ISBN":["9789819788002","9789819788019"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8801-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,25]]},"assertion":[{"value":"25 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mytilene","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icics2024.aegean.gr","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}