@incollection{, 0CD2FB22B8165AA33AE2C52383B7F171 , author={{Sunil DevidasBobade} and {Dr. Vijay R.Mankar} and {S.G.B.Amravati University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}151911 } @incollection{b0, , title={{Panic passwords: Authenticating under duress}} , author={{ JClark } and { UHengartner }} , booktitle={{USENIXWorkshop on Hot Topics in Security, Hot}} Sec , year={2008. 2008} } @incollection{b1, , title={{Physical unclonable functions and publickey crypto for fpga ip protection}} , author={{ JGuajardo } and { SKumar } and { GJSchrijen } and { PTuyls }} , booktitle={{International Conference on Field Programmable Logic and Applications}} , year={2007} } @incollection{b2, , title={{Offline hardware/software authentication for reconfigurable platforms}} , author={{ ESimpson } and { PSchaumont }} , booktitle={{CHES 2006. LNCS}} , editor={ LGoubin MMatsui } Heidelberg , publisher={Springer} , year={2006} 4249 } @incollection{b3, , title={{Physical Unclonable Function with Tristate Buffers}} , author={{ EOzturk } and { GHammouri } and { BSunar }} , booktitle={{Proc. ISCAS'08}} ISCAS'08 , year={2008} } @incollection{b4, , title={{The PUF Promise}} , author={{ HeikeBusch } and { MSotakova } and { StefanKatzenbeisser } and { RSion }} , booktitle={{3 rd International Conference on Trust and Trustworthy Computing (TRUST 2010)}} , booktitle={{Springer Lecture Notes in Computer Science}} , year={2010} 17 } @incollection{b5, , title={{FPGA intrinsic PUFs and their use for IP protection}} , author={{ JGuajardo } and { SKumar } and { GSchrigen } and { PTuyls }} , booktitle={{Proc. CHES'07}} CHES'07 , year={2007} } @incollection{b6, , title={{A D igital 1.6 PJ/bit Chip Identification Circuit Using Process Variations}} , author={{ YSu } and { JHolleman } and { BOtis }} , booktitle={{Proc. ISSCC'07}} ISSCC'07 , year={2007} } @incollection{b7, , title={{Two factor authenticated key exchange (TAKE) protocol in public wireless LANs}} , author={{ YMPark } and { SKPark }} , journal={{IEICE Transactions on Communications E87-B}} 5 , year={2004} } @incollection{b8, , title={{A two-factor mobile authentication scheme for secure financial transactions}} , author={{ RDPietro } and { GMe } and { MStrangio }} , booktitle={{International Conference on Mobile Business (ICMB 2005)}} , year={2005} } @incollection{b9, , title={{Privacy preserving multi-factor authentication with biometrics}} , author={{ ABhargav-Spantzel } and { ASqicciarini } and { SModi } and { MYoung } and { EBertino } and { SElliott }} , journal={{Journal of Computer Security}} 15 5 , year={2007} } @book{b10, , title={{Multi-factor password-authenticated key exchange}} , author={{ DStebila } and { PUdupi } and { SChang }} , year={2008. 2008} 214 , note={Technical Report ePrint Cryptology Archive} }