共 10 条
- [2] [丁振华 Ding Zhenhua], 2009, [计算机研究与发展, Journal of Computer Research and Development], V46, P583
- [3] Feldhofer M, 2004, LECT NOTES COMPUT SC, V3156, P357
- [4] Gassend B, 2002, P COMP COMM SEC C LA
- [5] Juels A, 2005, LECT NOTES COMPUT SC, V3621, P293
- [6] Karygiannis T., 2007, Guidelines for Securing Radio Frequency Identification 'Special Publication 800-98 NIST
- [7] Ruhrmair U., 2010, P 17 ACM C COMP COMM
- [8] Physical unclonable functions for device authentication and secret key generation [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 9 - +
- [9] Yuksel K., 2004, Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications
- [10] Zhou Yong-Bin, 2006, Chinese Journal of Computers, V29, P581