Login / Signup
Efficient fuzzy extractor implementations for PUF based authentication.
Yuejiang Wen
Yingjie Lao
Published in:
MALWARE (2017)
Keyphrases
</>
fuzzy sets
efficient implementation
neural network
evolutionary algorithm
computationally efficient
fuzzy rules
real time
artificial intelligence
rough sets
cost effective
membership functions