Login / Signup
Sample Essentiality and Its Application to Modeling Attacks on Arbiter PUFs.
Siwen Zhu
Yi Tang
Junxiang Zheng
Yongzhi Cao
Hanpin Wang
Yu Huang
Marian Margraf
Published in:
ACM Trans. Embed. Comput. Syst. (2019)
Keyphrases
</>
real time
countermeasures
information systems
web services
case study
wireless sensor networks
intrusion detection
computer security