Electronic devices have pervaded our everyday life to a previously unseen extent, and will likely continue to do so in the future. But their ubiquity also makes them a potential target for adversaries and brings about privacy and information security issues.
CITATION STYLE
Rührmair, U., Busch, H., & Katzenbeisser, S. (2010). Strong PUFs: Models, constructions, and security proofs. In Information Security and Cryptography (Vol. 0, pp. 79–96). Springer International Publishing. https://doi.org/10.1007/978-3-642-14452-3_4
Mendeley helps you to discover research relevant for your work.