Login / Signup

Sample Essentiality and Its Application to Modeling Attacks on Arbiter PUFs.

Siwen ZhuYi TangJunxiang ZhengYongzhi CaoHanpin WangYu HuangMarian Margraf
Published in: ACM Trans. Embed. Comput. Syst. (2019)
Keyphrases
  • real time
  • countermeasures
  • information systems
  • web services
  • case study
  • wireless sensor networks
  • intrusion detection
  • computer security