Login / Signup
Flowchart description of security primitives for Controlled Physical Unclonable Functions.
Boris Skoric
Marc X. Makkes
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
high level
information security
intrusion detection
network security
security requirements
low level
security policies
information assurance
security level
security analysis
real world
image sequences
risk analysis
case study
security model
security systems
security problems
data sets