{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T23:56:50Z","timestamp":1676073410269},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2010,8,3]],"date-time":"2010-08-03T00:00:00Z","timestamp":1280793600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1007\/s10207-010-0113-2","type":"journal-article","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:58:49Z","timestamp":1280757529000},"page":"327-335","source":"Crossref","is-referenced-by-count":1,"title":["Flowchart description of security primitives for controlled physical unclonable functions"],"prefix":"10.1007","volume":"9","author":[{"given":"Boris","family":"\u0160kori\u0107","sequence":"first","affiliation":[]},{"given":"Marc X.","family":"Makkes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,3]]},"reference":[{"key":"113_CR1","first-page":"475","volume":"436","author":"J.D.R. Buchanan","year":"2005","unstructured":"Buchanan J.D.R., Cowburn R.P., Jausovec A., Petit D., Seem P., Xiong G., Atkinson D., Fenton K., Allwood D.A., Bryan M.T.: Forgery: \u2018fingerprinting\u2019 documents and packaging. Nat. Brief Commun. 436 475 (2005)","journal-title":"Nat. Brief Commun."},{"key":"113_CR2","doi-asserted-by":"crossref","unstructured":"DeJean, G., Kirovski, D.: Radio frequency certificates of authenticity. In: IEEE Antenna and Propagation Symposium\u2014URSI (2006)","DOI":"10.1109\/APS.2006.1710711"},{"key":"113_CR3","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive, Report 2003\/235","DOI":"10.1007\/978-3-540-24676-3_31"},{"issue":"1","key":"113_CR4","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y. Dodis","year":"2008","unstructured":"Dodis Y., Ostrovsky R., Reyzin L., Smith A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"113_CR5","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D.E., van Dijk, M., Devadas S.: Controlled physical random functions. In: ACSAC 2002, pp. 149\u2013160. IEEE Computer Society (2002)","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"113_CR6","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon physical unknown functions. In: Atluri, V. (eds.) ACM Conference on Computer and Communications Security\u2014CCS 2002, pp. 148\u2013160. ACM, November (2002)","DOI":"10.1145\/586131.586132"},{"key":"113_CR7","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-1-84628-984-2_14","volume-title":"Security with Noisy Data, Chapter Controlled Physical Random Functions","author":"B. Gassend","year":"2007","unstructured":"Gassend B., van Dijk M., Clarke D., Devadas S.: Security with Noisy Data, Chapter Controlled Physical Random Functions, pp. 235\u2013253. Springer, London (2007)"},{"issue":"4","key":"113_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1284680.1284683","volume":"10","author":"B. Gassend","year":"2008","unstructured":"Gassend B., van Dijk M., Clarke D.E., Torlak E., Devadas S., Tuyls P.: Controlled physical random functions and applications. ACM Trans. Inf. Syst. Secur. 10(4), 1\u201322 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"113_CR9","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: CHES 2007, LNCS, vol. 4727, pp. 63\u201380","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"113_CR10","doi-asserted-by":"crossref","unstructured":"Ignatenko, T., Schrijen, G.J., \u0160kori\u0107, B., Tuyls, P., Willems, F.M.J.: Estimating the secrecy rate of physical uncloneable functions with the context-tree weighting method. In: Proceedings of the IEEE International Symposium on Information Theory 2006, pp. 499\u2013503, Seattle, USA (2006)","DOI":"10.1109\/ISIT.2006.261765"},{"key":"113_CR11","doi-asserted-by":"crossref","unstructured":"Linnartz, J.P.M.G., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M. (eds.) Conference on Audio and Video Based Person Authentication, LNCS, vol. 2688, pp. 238\u2013250. Springer (2003)","DOI":"10.1007\/3-540-44887-X_47"},{"key":"113_CR12","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R. Pappu","year":"2002","unstructured":"Pappu R., Recht B., Taylor J., Gershenfeld N.: Physical one-way functions. Science 297, 2026\u20132030 (2002)","journal-title":"Science"},{"key":"113_CR13","unstructured":"Torlak, E., van Dijk, M., Gassend, B., Jackson, D., Devadas, S.: Knowledge flow analysis for security protocols. CoRR, abs\/cs\/0605109 (2006)"},{"key":"113_CR14","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Schrijen, G.J., \u0160kori\u0107, B., van Geloven, J., Verhaegh, R., Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2006, LNCS, vol. 4249, pp. 369\u2013383. Springer (2006)","DOI":"10.1007\/11894063_29"},{"key":"113_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84628-984-2","volume-title":"Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting","author":"P. Tuyls","year":"2007","unstructured":"Tuyls P., \u0160kori\u0107 B., Kevenaar T.: Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer, London (2007)"},{"key":"113_CR16","doi-asserted-by":"crossref","unstructured":"Tuyls, P., \u0160kori\u0107, B., Stallinga, S., Akkermans, A.H.M., Ophey, W.: Information-theoretic security analysis of physical uncloneable functions. In: Patrick, A.S., Yung, M. (eds.) 9th Conference on Financial Cryptography and Data Security, LNCS, vol. 3570, pp. 141\u2013155. Springer (2005)","DOI":"10.1007\/11507840_15"},{"issue":"5","key":"113_CR17","doi-asserted-by":"crossref","first-page":"055304","DOI":"10.1088\/1464-4258\/10\/5\/055304","volume":"10","author":"B. \u0160kori\u0107","year":"2008","unstructured":"\u0160kori\u0107 B.: On the entropy of keys derived from laser speckle; statistical properties of Gabor-transformed speckle. J. Opt. A Pure Appl. Opt. 10(5), 055304\u2013055316 (2008)","journal-title":"J. Opt. A Pure Appl. Opt."},{"key":"113_CR18","unstructured":"\u0160kori\u0107, B., Bel, T., Blom, A.H.M., de Jong, B.R., Kretschman, H., Nellissen, A.J.M.: Randomized resonators as uniquely identifiable anti-counterfeiting tags. In: Secure Component and System Identification (SECSI) Workshop, pp. 1\u201312 (March 2008)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0113-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-010-0113-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0113-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:07:27Z","timestamp":1559358447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-010-0113-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,3]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,10]]}},"alternative-id":["113"],"URL":"https:\/\/doi.org\/10.1007\/s10207-010-0113-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,3]]}}}