共 25 条
[11]
Holcomb D., 2007, P RFID SEC C
[12]
Karakoyunlu D, 2010, IEEE INT WORKS INFOR
[13]
Kazmierski C., 2011, SIA PRESIDENT TESTIF
[14]
Kirkpatrick M.S., 2010, SEC COMP SYST ID SEC
[15]
Kumar R, 2014, 2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P38, DOI 10.1109/HST.2014.6855565
[16]
Maiti A., 2011, 2011 International Conference on Field Programmable Logic and Applications, P151, DOI 10.1109/FPL.2011.35
[17]
Maiti A, 2009, GLSVLSI 2009: PROCEEDINGS OF THE 2009 GREAT LAKES SYMPOSIUM ON VLSI, P425
[18]
Modeling Attacks on Physical Unclonable Functions
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:237-249
[19]
Rukhin A., 2010, 80022 NIST SP US DEP
[20]
Sadeghi AR, 2011, WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P109