{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T23:21:21Z","timestamp":1773703281179,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845456","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:42:54Z","timestamp":1486658574000},"page":"700-705","source":"Crossref","is-referenced-by-count":63,"title":["A PUF-based paradigm for IoT security"],"prefix":"10.1109","author":[{"given":"Tarek","family":"Idriss","sequence":"first","affiliation":[{"name":"The Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, Louisiana, USA"}]},{"given":"Haytham","family":"Idriss","sequence":"additional","affiliation":[{"name":"The Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, Louisiana, USA"}]},{"given":"Magdy","family":"Bayoumi","sequence":"additional","affiliation":[{"name":"The Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, Louisiana, USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519377"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical one-way functions","volume":"297","author":"pappu","year":"2002","journal-title":"Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2300635"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"ref14","article-title":"On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation","author":"tobisch","year":"2015","journal-title":"Radio Frequency Identification: Security and Privacy Issues"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22846-4_2"},{"key":"ref16","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"2007","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSE.2007.44"},{"key":"ref4","article-title":"Towards the five-cent tag","author":"sarma","year":"2001","journal-title":"Technical ReportMIT-AUTOID-WH-006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70226"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2014.2387333"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.63"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","location":"Reston, VA, USA","start":{"date-parts":[[2016,12,12]]},"end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845456.pdf?arnumber=7845456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:43:34Z","timestamp":1755197014000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7845456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845456","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}