{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T04:30:35Z","timestamp":1770352235802,"version":"3.49.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"The Royal Society Research","award":["RGS R1221183"],"award-info":[{"award-number":["RGS R1221183"]}]},{"name":"A&#x002A;STAR"},{"name":"CISCO Systems Pte. Ltd"},{"DOI":"10.13039\/501100001352","name":"National University of Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001352","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cisco-NUS Accelerated Digital Economy Corporate Laboratory","award":["I21001E0002"],"award-info":[{"award-number":["I21001E0002"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tsc.2025.3536314","type":"journal-article","created":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T18:56:59Z","timestamp":1738177019000},"page":"912-925","source":"Crossref","is-referenced-by-count":3,"title":["Lightweight and Privacy-Preserving Reconfigurable Authentication Scheme for IoT Devices"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2786-0273","authenticated-orcid":false,"given":"Prosanta","family":"Gope","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Sheffield, Sheffield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9113-9398","authenticated-orcid":false,"given":"Fei","family":"Hongming","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0084-4647","authenticated-orcid":false,"given":"Biplab","family":"Sikdar","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, National University of Singapore, Singapore"}]}],"member":"263","reference":[{"key":"ref2","article-title":"The Internet of Things","author":"Newman","year":"2020"},{"key":"ref3","article-title":"IoT devices still major target for cyberattacks","author":"Spadafora","year":"2011"},{"key":"ref4","article-title":"Physical one-way functions","author":"Ravikanth","year":"2001"},{"key":"ref5","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"Proc. 44th ACM\/IEEE Des. Automat. Conf.","author":"Suh"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1993.298623"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24837-0_2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2891223"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85855-3_6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69861-6_10"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25286-0_6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"ref14","article-title":"Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance","author":"Wisiol","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2020.i3.97-120"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2832849"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2832201"},{"key":"ref18","article-title":"PUF-based RFID authentication secure and private under complete memory leakage","volume":"2013","author":"Moriyama","year":"2013","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_28"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2553027"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/spw.2012.30"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.047"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST47458.2019.9006710"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225058"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.360"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"ref27","volume-title":"Physically Unclonable Functions: Constructions, Properties and Applications","author":"Roel","year":"2013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22846-4_2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"key":"ref31","first-page":"51","article-title":"Physical uncloneable functions in the universal composition framework","volume-title":"Proc. Annu. Cryptology Conf.","author":"Brzuska"},{"key":"ref32","first-page":"221","article-title":"Security and privacy: Modest proposals for low-cost RFID systems","volume-title":"Proc. Auto-ID Labs Res. Workshop","author":"Ranasinghe"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_28"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2020.3012218"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.27"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3105915"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_20"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2870835"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.06.012"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2021.3072421"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4629386\/10964032\/10857455.pdf?arnumber=10857455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T17:39:31Z","timestamp":1744652371000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10857455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":40,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2025.3536314","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}