|
[1]
|
Burrows, M., Abadi, M. and Needham, R. (1990) A Logic of Authentication. ACM Transactions on Computer Systems, 8, 18-36. [Google Scholar] [CrossRef]
|
|
[2]
|
Blue, J., Condell, J. and Lunney, T. (2018) A Review of Identity, Identification and Authentication. International Journal for Information Security Research, 8, 794-804. [Google Scholar] [CrossRef]
|
|
[3]
|
Kaushalya, J. and Sai, R.V. (2020) A Survey on Efficient and Secure Implementation of ECDSA against Fault Attack. International Journal of Emerging Trends in Engineering Research, 8, 2945-2954. [Google Scholar] [CrossRef]
|
|
[4]
|
Shaaban, M.A., Alsharkawy, A.S., AbouKreisha, M.T., et al. (2024) Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment. International journal of Computer Networks & Communications, 15, 55-71. [Google Scholar] [CrossRef]
|
|
[5]
|
Holthouse, R., Owens, S. and Bhunia, S. (2025) The 23andMe Data Breach: Analyzing Credential Stuffing Attacks, Security Vulnerabilities, and Mitigation Strategies. https://arxiv.org/pdf/2502.04303
|
|
[6]
|
Zhang, H. and Zhao, F. (2023) Cross-Domain Identity Authentication Scheme Based on Blockchain and PKI System. High-Confidence Computing, 3, Article 100096. [Google Scholar] [CrossRef]
|
|
[7]
|
Manasrah, A., Yaseen, Q., Al-Aqrabi, H. and Liu, L. (2025) Identity-Based Authentication in VANETs: A Review. IEEE Transactions on Intelligent Transportation Systems, 26, 4260-4282. [Google Scholar] [CrossRef]
|
|
[8]
|
Gebali, F. and Mamun, M. (2022) Review of Physically Unclonable Functions (PUFs): Structures, Models, and Algorithms. Frontiers in Sensors, 2, Article 751748. [Google Scholar] [CrossRef]
|
|
[9]
|
Suh, G.E. and Devadas, S. (2007) Physical Unclonable Functions for Device Authentication and Secret Key Generation. 2007 44th ACM/IEEE Design Automation Conference, San Diego, 4-8 June 2007, 9-14.
|
|
[10]
|
Rullo, A., Felicetti, C., Vatalaro, M., De Rose, R., Lanuzza, M., Crupi, F., et al. (2025) PUF-Based Authentication-Oriented Architecture for Identification Tags. IEEE Transactions on Dependable and Secure Computing, 22, 66-83. [Google Scholar] [CrossRef]
|
|
[11]
|
Moriyama, D., Matsuo, S. and Yung, M. (2013) PUF-Based RFID Authentication Secure and Private under Memory Leakage. https://eprint.iacr.org/2013/712
|
|
[12]
|
Ba, M.H.N., Bennett, J., Gallagher, M., et al. (2021) A Case Study of Credential Stuffing Attack: Canva Data Breach. 2021 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, 15-17 December 2021, 735-740. [Google Scholar] [CrossRef]
|
|
[13]
|
Roy, P., Kumar, R. and Morshed, M.N. (2024) AAF-SCM: An Authenticated Framework for Supply Chain Management. 2024 International Conference on Intelligent Systems and Advanced Applications (ICISAA), Pune, 25-26 October 2024, 1-4. [Google Scholar] [CrossRef]
|
|
[14]
|
Alhasan, A.Q.A., Rohani, M.F. and Abu-Ali, M.S. (2024) Ultra-Lightweight Mutual Authentication Protocol to Prevent Replay Attacks for Low-Cost RFID Tags. IEEE Access, 12, 50925-50934. [Google Scholar] [CrossRef]
|
|
[15]
|
Le, T.M.C., Pham, X.T. and Le, V.T. (2024) Advancing Security Protocol Verification: A Comparative Study of Scyther, Tamarin. Journal of Technical Education Science, 19, 43-53. [Google Scholar] [CrossRef]
|