共 53 条
[2]
Trendsin hardware security from basics to ASICs
[J].
IEEE Solid-State Circuits Magazine,
2019, 11 (03)
:56-74
[3]
Alkatheiri MS, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P181, DOI 10.1109/DESEC.2017.8073845
[7]
A Machine Learning-based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things
[J].
2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT),
2018,
:49-56
[8]
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:556-576