Login / Signup
More Lessons: Analysis of PUF-based Authentication Protocols for IoT.
Karim Lounis
Mohammad Zulkernine
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
data analysis
management system
database systems
information systems
e government
network security