Keyphrases
Function Approach
100%
Resistive Random Access Memory (ReRAM)
100%
Physical Unclonable Function
100%
Secure Authentication
100%
Physically Unclonable Function
100%
Software-defined Wireless Sensor Networks (SDWSNs)
100%
Controller
28%
Internet of Things Devices
28%
Public Key Infrastructure
28%
Centralized Management
14%
Access Control
14%
Function-based
14%
Wireless Devices
14%
Nanomaterials
14%
World Wide Web
14%
Temperature Conditions
14%
Security Threats
14%
Decision-making Approach
14%
Large-scale Networks
14%
Limited Power
14%
Deployment Cost
14%
Machine Learning Techniques
14%
Potential Errors
14%
Power Capability
14%
Key Distribution
14%
Function Response
14%
Key Storage
14%
Challenge-response Pair
14%
Authentication Mechanism
14%
State Machine Learning
14%
Security Vulnerabilities
14%
Authentication Protocol
14%
Memory-based
14%
Hardware Security
14%
Computation Capability
14%
Authentication Control
14%
Internet of Things Networks
14%
Physical Variation
14%
Data Flow Management
14%
Digital-physical
14%
Biased Conditions
14%
Natural Drift
14%
Secure Access
14%
Centralized Decision
14%
Security Protocols
14%
Computer Science
Wireless Networks
100%
Authentication
100%
Random Access Memory
100%
Wireless Networking
66%
Internet of Things Device
66%
Public Key Infrastructure
66%
Centralized Management
33%
Decision-Making
33%
Experimental Result
33%
Wireless Device
33%
Machine Learning Technique
33%
Internet of Things
33%
Response Function
33%
Authentication Mechanism
33%
Key Distribution
33%
Security Vulnerability
33%
Authentication Protocol
33%
Access Control
33%
Hardware Security
33%
Security protocols
33%
Computation Capability
33%
State Machine
33%