Login / Signup
Does Sophisticating Double Arbiter PUF Design Ensure its Security? Performance and Security Assessments on 5-1 DAPUF.
Meznah A. Alamro
Khalid T. Mursi
Yu Zhuang
Mohammed Saeed Alkatheiri
Ahmad O. Aseeri
Published in:
IEEE BigData (2020)
Keyphrases
</>
information security
functional requirements
intrusion detection
data integrity
security mechanisms
security requirements
statistical databases
security issues
information assurance
access control
security protocols
key management
network security
design process
sensitive data
engineering design
cloud computing