{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:51:24Z","timestamp":1729619484759,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/vnc.2012.6407450","type":"proceedings-article","created":{"date-parts":[[2013,1,25]],"date-time":"2013-01-25T19:44:09Z","timestamp":1359143049000},"page":"94-100","source":"Crossref","is-referenced-by-count":11,"title":["On the potential of PUF for pseudonym generation in vehicular networks"],"prefix":"10.1109","author":[{"given":"Jonathan","family":"Petit","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Bosch","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Feiri","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689253"},{"key":"35","first-page":"3","article-title":"Physically unclonable functions: A study on the state of the art and future research directions","author":"maes","year":"0","journal-title":"Towards Hardware-Intrinsic Security"},{"key":"17","article-title":"Digital signatures for automobiles","author":"gollan","year":"2002","journal-title":"Proceedings of Systemics Cybernetics and Informatics (SCI)"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/81.847868"},{"key":"18","first-page":"270","article-title":"Security issues in a future vehicular network","author":"zarki","year":"2002","journal-title":"European Wireless"},{"key":"33","first-page":"228","article-title":"Physical unclonable functions in cryptographic protocols: Security proofs and impossibility results","author":"van dijk","year":"0","journal-title":"Cryptology ePrint Archive"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2009.5073800"},{"key":"34","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1007\/11535218_33","article-title":"Hmqv: A high-performance secure diffie-hellman protocol","volume":"3621","author":"krawczyk","year":"0","journal-title":"Lecture Notes in Computer Science"},{"key":"16","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-642-04431-1_15","article-title":"Hardware-based public-key cryptography with public physically unclonable functions","author":"beckmann","year":"2009","journal-title":"Information Hiding"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261765"},{"key":"13","first-page":"393","article-title":"New shielding functions to enhance privacy and prevent misuse of biometric templates","volume":"2688","author":"linnartz","year":"2003","journal-title":"LNCS"},{"key":"14","first-page":"384","article-title":"Deriving secrecy in key establishment protocols","author":"pavlovic","year":"2006","journal-title":"Proceedings of the 11th European Conference on Research in Computer Security Ser ESORICS'06"},{"key":"37","article-title":"Puf-based random number generation","volume":"481","author":"odonnell","year":"2004","journal-title":"MIT CSAIL CSG Technical Memo"},{"key":"11","first-page":"311","article-title":"Offline hardware\/software authentication for reconfigurable platforms","volume":"4249","author":"simpson","year":"2006","journal-title":"LNCS"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.22"},{"key":"12","first-page":"523","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","volume":"3027","author":"dodis","year":"2004","journal-title":"LNCS"},{"journal-title":"Public Key Infrastructure Memo","year":"2010","key":"21"},{"journal-title":"IEEE 1609 2v2-Standard for Wireless Access in Vehicular Environments (WAVE)-Security Services for Applications and Management Messages","year":"2011","key":"20"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955011"},{"key":"22","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","volume":"84","author":"shamir","year":"1985","journal-title":"Advances in Cryptology CRYPTO"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089775"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2007.37"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955011"},{"key":"27","first-page":"255","article-title":"Simpl systems: On a public key variant of physical unclonable functions","volume":"2009","author":"ruhrmair","year":"2009","journal-title":"Cryptology ePrint Archive"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689253"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2007.4380646"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.135"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030096"},{"key":"7","first-page":"369","article-title":"Read-proof hardware from protective coatings,\" in cryptographic hardware and embedded systems-CHES 2006, ser","volume":"4249","author":"tuyls","year":"2006","journal-title":"LNCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"32","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-540-85053-3_12","article-title":"Efficient helper data key extractor on FPGAs","volume":"5154","author":"bosch","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"31","first-page":"147","article-title":"Secure remote authentication using biometric data","author":"boyen","year":"2005","journal-title":"Advances in Cryptology-Eurocrypt"},{"journal-title":"Physical one-way functions","year":"2001","author":"pappu","key":"4"},{"journal-title":"Randomized Resonators As Uniquely Identifiable Anti-counterfeiting Tags","year":"2008","author":"skoric","key":"9"},{"key":"8","first-page":"63","article-title":"FPGA intrinsic PUFs and their use for IP protection","volume":"4727","author":"guajardo","year":"0","journal-title":"LNCS"}],"event":{"name":"2012 IEEE Vehicular Networking Conference (VNC)","start":{"date-parts":[[2012,11,14]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2012,11,16]]}},"container-title":["2012 IEEE Vehicular Networking Conference (VNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6387734\/6407366\/06407450.pdf?arnumber=6407450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T06:24:43Z","timestamp":1498026283000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6407450\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/vnc.2012.6407450","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}