Flowchart description of security primitives for controlled physical unclonable functions.
Boris SkoricMarc X. MakkesPublished in: Int. J. Inf. Sec. (2010)
Keyphrases
- high level
- information security
- security problems
- network security
- security issues
- real world
- computer security
- security requirements
- security mechanisms
- database systems
- data security
- security systems
- user authentication
- neural network
- security threats
- security management
- cyber physical systems
- security measures
- information assurance