Results 121 to 130 of about 137,811 (163)
Some of the next articles are maybe not open access.
PUF Modeling Attacks on Simulated and Silicon Data
IEEE Transactions on Information Forensics and Security, 2013Ulrich Rührmair +2 more
exaly
A PUF Based on a Transient Effect Ring Oscillator and Insensitive to Locking Phenomenon
IEEE Transactions on Emerging Topics in Computing, 2014Lilian Bossuet, Viktor Fischer
exaly
Attacks on PUFs and PUF-based Systems
2015Christian Wachsmann, Ahmad-Reza Sadeghi
openaire +1 more source
Proceedings of the National Academy of Sciences of the United States of America, 2005
Judith Kimble
exaly
Judith Kimble
exaly
Target selection by natural and redesigned PUF proteins
Proceedings of the National Academy of Sciences of the United States of America, 2015Douglas F Porter +2 more
exaly

