{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T15:37:18Z","timestamp":1768837038846,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100016311","name":"Arm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016311","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,4]]},"DOI":"10.1109\/cns53000.2021.9705035","type":"proceedings-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T20:28:04Z","timestamp":1644524884000},"page":"272-280","source":"Crossref","is-referenced-by-count":1,"title":["Unconditional Authentication for Constrained Applications via Strong PUFs"],"prefix":"10.1109","author":[{"given":"Ahmed","family":"Bendary","sequence":"first","affiliation":[{"name":"The Ohio State University,Department of ECE,Columbus,USA,OH 43210"}]},{"given":"C. Emre","family":"Koksal","sequence":"additional","affiliation":[{"name":"The Ohio State University,Department of ECE,Columbus,USA,OH 43210"}]},{"given":"Daniel","family":"Canaday","sequence":"additional","affiliation":[{"name":"Potomac Research LLC,Alexandria,USA,VA 22314"}]},{"given":"Andrew","family":"Pomerance","sequence":"additional","affiliation":[{"name":"Potomac Research LLC,Alexandria,USA,VA 22314"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3066948"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2891223"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2572725"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364429"},{"key":"ref12","first-page":"1","article-title":"Exploiting Channel Gain and Phase Noise for PHY-layer Authentication in Massive MIMO Systems","author":"zhang","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3054534"},{"key":"ref14","article-title":"Sequential analysis","author":"wald","year":"1947","journal-title":"John Wiley and Sons"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809386"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SSP.2016.7551815"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-41395-7","article-title":"Physically Unclonable Functions: Constructions, Properties and Applications","author":"maes","year":"2013"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref28","article-title":"Dataset","author":"bendary","year":"2021","journal-title":"IEEE Dataport"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400413"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1080\/00031305.1991.10475828","article-title":"A Method for Generating High-Dimensional Multivariate Binary Variates","volume":"45","author":"emrich","year":"1991","journal-title":"The American Statistician"},{"key":"ref3","first-page":"277","article-title":"On the Foundations of Physical Unclonable Functions","volume":"2009","author":"r\u00fchrmair","year":"2009","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_19"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.850674"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2886624"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2009842"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.805"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2818186"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_35"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1362-2_11"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2341-0"},{"key":"ref23","article-title":"Testing Statistical Hypotheses","author":"lehmann","year":"2006","journal-title":"Springer Science & Business Media"},{"key":"ref26","article-title":"Sequential Methods and Their Applications","author":"n","year":"2008"},{"key":"ref25","article-title":"Elements of Information Theory","author":"cover","year":"2012"}],"event":{"name":"2021 IEEE Conference on Communications and Network Security (CNS)","location":"Tempe, AZ, USA","start":{"date-parts":[[2021,10,4]]},"end":{"date-parts":[[2021,10,6]]}},"container-title":["2021 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9705016\/9705017\/09705035.pdf?arnumber=9705035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T08:16:55Z","timestamp":1726647415000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9705035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,4]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cns53000.2021.9705035","relation":{},"subject":[],"published":{"date-parts":[[2021,10,4]]}}}