共 7 条
[1]
Gao Yansong, 2016, 2016 IEEE INT C PERV
[3]
Merli D, 2011, LECT NOTES COMPUT SC, V6740, P33, DOI 10.1007/978-3-642-21599-5_3
[5]
Modeling Attacks on Physical Unclonable Functions
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:237-249
[6]
Physical unclonable functions for device authentication and secret key generation
[J].
2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2,
2007,
:9-+
[7]
A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication
[J].
IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS,
2016, 2 (03)
:146-159