{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:31:31Z","timestamp":1772908291844,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"SUTD-ZJU Research Collaboration","award":["SUTD-ZJU\/RES\/01\/2016"],"award-info":[{"award-number":["SUTD-ZJU\/RES\/01\/2016"]}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea through the Korean Government (MSIP)","doi-asserted-by":"publisher","award":["2017R1C1B2009280"],"award-info":[{"award-number":["2017R1C1B2009280"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DGIST Research and Development Program of the Ministry of Science and ICT","award":["18-EE-01"],"award-info":[{"award-number":["18-EE-01"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/tifs.2018.2832849","type":"journal-article","created":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T19:05:25Z","timestamp":1525374325000},"page":"2831-2843","source":"Crossref","is-referenced-by-count":212,"title":["Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2786-0273","authenticated-orcid":false,"given":"Prosanta","family":"Gope","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0152-7739","authenticated-orcid":false,"given":"Jemin","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4037-3149","authenticated-orcid":false,"given":"Tony Q. S.","family":"Quek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"134","article-title":"New maskless debiasing method for lightweight physical unclonable function","author":"aysu","year":"2017","journal-title":"Proc IEEE Symp Hardware Oriented Security Trust"},{"key":"ref38","first-page":"28","article-title":"Secure and private, yet lightweight, authentication for the IoT via PUF and CBKA","author":"huth","year":"2017","journal-title":"Proc Int Conf Inf Secur Cryptol (ICISC)"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/978-3-642-32946-3_27","article-title":"Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs","volume":"7397","author":"van herrewege","year":"2012","journal-title":"Financial Cryptography and Data Security"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2016.65"},{"key":"ref31","author":"bohm","year":"2012","journal-title":"Physical Unclonable Functions in Theory and Practice"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2585081"},{"key":"ref37","year":"2018","journal-title":"High-Capacity RFID Tags"},{"key":"ref36","first-page":"412","article-title":"Efficient fuzzy extraction of puf-induced secrets: Theory and applications","volume":"9813","author":"delvaux","year":"2016","journal-title":"Proc 8th Int Conf Cryptogr Hardw Embedded Syst (CHES)"},{"key":"ref35","first-page":"556","article-title":"End-to-end design of a puf-based privacy preserving authentication protocol","volume":"9293","author":"aysu","year":"2015","journal-title":"Proc 8th Int Conf Cryptogr Hardw Embedded Syst (CHES)"},{"key":"ref34","article-title":"PUF-based RFID authentication secure and private under complete memory leakage","volume":"712","author":"moriyama","year":"2013","journal-title":"IACR Cryptology ePrint"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/642425"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64647-3_15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.02.004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2015.13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.06.005"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.061012"},{"key":"ref18","first-page":"17","article-title":"Mutual authentication protocol for low-cost RFID","author":"yang","year":"2005","journal-title":"Proc Ecrypt Workshop on RFID and Lightweight Crypto"},{"key":"ref19","first-page":"620","article-title":"A lightweight mutual authentication protocol for RFID networks","author":"luo","year":"2005","journal-title":"Proc IEEE Int Conf e-Business Eng"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3165"},{"key":"ref28","first-page":"388","article-title":"Differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Adv Cryptology"},{"key":"ref3","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2014","journal-title":"Proc ACM\/IEEE Design Autom Conf (DAC)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/978-3-642-04159-4_26","article-title":"ECC is ready for RFID&#x2014;A proof in silicon","volume":"5381","author":"hein","year":"2009","journal-title":"Selected Areas in Cryptography"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2628413"},{"key":"ref29","year":"2016","journal-title":"AVISPA Automated Validation of Internet Security Protocols and Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.174"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/978-3-642-16822-2_16","article-title":"An ECDSA processor for RFID authentication","volume":"6370","author":"hutter","year":"2010","journal-title":"Radio Frequency Identification Security and Privacy Issues"},{"key":"ref2","article-title":"Physical one-way functions","author":"ravikanth","year":"2001"},{"key":"ref9","first-page":"43","article-title":"Privacy enhanced active RFID tag","author":"kinoshita","year":"2005","journal-title":"Proc Int'l Workshop Exploiting Context Histories in Smart Environments"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2441113"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.004"},{"key":"ref22","first-page":"102","article-title":"PUF-enhanced offline RFID security and privacy","author":"sadeghi","year":"2010","journal-title":"Proc Workshop Secure Compon Syst Identificat"},{"key":"ref21","first-page":"77","article-title":"Improved privacy of the tree-based hash protocols using physically unclonable function","author":"bringer","year":"2008","journal-title":"Proc 6th Int Conf Secur Cryptogr Netw (SCN)"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/978-3-642-25286-0_6","article-title":"A novel RFID distance bounding protocol based on physically unclonable functions","author":"kardas","year":"2012","journal-title":"Proc Int Conf RFID Secur Privacy"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2774761"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.73"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.02.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.08.006"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8361165\/08353855.pdf?arnumber=8353855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T01:04:51Z","timestamp":1643159091000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8353855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":41,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2018.2832849","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]}}}