Login / Signup

Feasibility and Infeasibility of Secure Computation with Malicious PUFs.

Dana Dachman-SoledNils FleischhackerJonathan KatzAnna LysyanskayaDominique Schröder
Published in: CRYPTO (2) (2014)
Keyphrases
  • malicious attacks
  • information systems
  • cloud computing
  • feasible solution
  • security issues