Login / Signup
SRAM-PUF Authentication Schemes Empowered with Blockchain on Resource-Constrained Microcontrollers.
Mario Barbareschi
Franco Cirillo
Christian Esposito
Published in:
ISORC (2024)
Keyphrases
</>
resource constrained
security mechanisms
wireless sensor networks
resource constraints
sensor networks
resource limitations
key management
power consumption
multipath
rfid tags
visual sensor networks
embedded systems
electronic devices
low cost
data sets
search algorithm