共 13 条
- [1] [Anonymous], IEEE 12 INT S EMB MU
- [2] [Anonymous], JTAG LIV STUD
- [3] [Anonymous], 2014, IEEE Std 1687-2014, DOI [DOI 10.1109/IEEESTD.2014.6804630, 10.1109/IEEESTD.2014.6755433, DOI 10.1109/IEEESTD.2014.6837414]
- [4] Katzenbeisser S, 2012, LECT NOTES COMPUT SC, V7428, P283, DOI 10.1007/978-3-642-33027-8_17
- [6] A technique to build a secret key in integrated circuits for identification and authentication applications [J]. 2004 SYMPOSIUM ON VLSI CIRCUITS, DIGEST OF TECHNICAL PAPERS, 2004, : 176 - 179
- [7] Paral Z., 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), P128, DOI 10.1109/HST.2011.5955010
- [8] Pathrose J., 2018, 2018 IEEE 19 LATINAM, P1
- [9] Physical unclonable functions for device authentication and secret key generation [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 9 - +