{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:36:34Z","timestamp":1773246994013,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tetc.2025.3563064","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T13:34:16Z","timestamp":1745847256000},"page":"1055-1067","source":"Crossref","is-referenced-by-count":3,"title":["Design and Implementation of Cost-Effective End-to-End Authentication Protocol for PUF-Enabled IoT Devices"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1885-3995","authenticated-orcid":false,"given":"Sourav","family":"Roy","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology Durgapur, Durgapur, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3047-236X","authenticated-orcid":false,"given":"Mahabub Hasan","family":"Mahalat","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Technology, ITER, S&#x2018;O&#x2019;A (Deemed to be University), Bhubaneswar, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4803-3074","authenticated-orcid":false,"given":"Bibhash","family":"Sen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology Durgapur, Durgapur, West Bengal, India"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","article-title":"The computer for the 21st century","volume":"265","author":"Weiser","year":"1991","journal-title":"Sci. Amer."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3096048"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3283347"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3033060"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2895030"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2014.7001385"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3178115"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2023.3296016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2021.3115176"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3494612"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2018.8534575"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2623609"},{"issue":"8","key":"ref16","doi-asserted-by":"crossref","DOI":"10.3390\/sym10080352","article-title":"PUF based authentication protocol for IoT","volume":"10","author":"Braeken","year":"2018","journal-title":"Symmetry"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2832201"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3028872"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3059454"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2911155"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2689726"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"issue":"2","key":"ref28","first-page":"3","article-title":"Verifying group authentication protocols by scyther","volume":"7","author":"Yang","year":"2016","journal-title":"J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl."},{"key":"ref29","article-title":"GitHub: Scyther scripts for ECC-Fe protocol","author":"Roy","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3491212"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.805"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69861-6_10"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/DATE58400.2024.10546703"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703088"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5220\/0010550900002998"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3202265"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2818186"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3466682"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3193570"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3005715"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6245516\/11159571\/10979278.pdf?arnumber=10979278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T04:57:01Z","timestamp":1757653021000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10979278\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":40,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2025.3563064","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}