{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:36:29Z","timestamp":1729665389158,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/icufn.2012.6261713","type":"proceedings-article","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T20:03:37Z","timestamp":1345147417000},"page":"288-293","source":"Crossref","is-referenced-by-count":2,"title":["Securing home networks using Physically Unclonable Functions"],"prefix":"10.1109","author":[{"given":"Sushmita","family":"Ruj","sequence":"first","affiliation":[]},{"given":"Amiya","family":"Nayak","sequence":"additional","affiliation":[]},{"given":"Sagar","family":"Naik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"133","author":"tuyls","year":"2007","journal-title":"Strong Authentication with Physical Unclonable Functions"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-58575-3","author":"van lint","year":"1999","journal-title":"Introduction to Coding Theory"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"14","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","volume":"3027","author":"dodis","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"11","first-page":"249","article-title":"An improved low computation cost user authentication scheme for mobile communication","author":"lee","year":"2005","journal-title":"AINA"},{"key":"12","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","article-title":"FPGA intrinsic pufs and their use for ip protection","volume":"4727","author":"guajardo","year":"2007","journal-title":"Lecture Notes in Computer Science"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102315"},{"key":"2","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/35.925682","article-title":"Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks","volume":"39","author":"toh","year":"2001","journal-title":"IEEE Communication Magazine"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6133947"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455782"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.208"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2011.6157417"},{"key":"5","first-page":"256","article-title":"At home with ubiquitous computing: Seven challenges","author":"edwards","year":"2001","journal-title":"Ubicomp"},{"key":"4","article-title":"Computing systems for household energy conservation: Consumer response and social ecological considerations","author":"mccalley","year":"0","journal-title":"CHI Workshop on Social Implications of Ubiquitous Computing 2005"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_16"},{"key":"8","first-page":"382","article-title":"Biometric implementation in autonomous systems with an emphasis on smart home applicability","author":"matthew","year":"0","journal-title":"IEEE Information Society Conference 2011"}],"event":{"name":"2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN)","start":{"date-parts":[[2012,7,4]]},"location":"Puket, Thailand","end":{"date-parts":[[2012,7,6]]}},"container-title":["2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6252853\/6261644\/06261713.pdf?arnumber=6261713","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T22:56:17Z","timestamp":1497999377000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6261713\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icufn.2012.6261713","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}