共 38 条
[1]
Akriotou M., 2018, P 2018 ISCIS SEC WOR
[2]
Aman M., 2016, Proc. Int'l Workshop on IoT Privacy, Trust, P10, DOI [10.1145/2899007.2899013, DOI 10.1145/2899007.2899013]
[3]
[Anonymous], 2010, HARDWARE INTRINSIC S
[4]
[Anonymous], 2007, Security with noisy data: on private biometrics, secure key storage and anti-counterfeiting
[5]
A Formal Foundation for the Security Features of Physical Functions
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:397-412
[7]
The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:535-555
[9]
Candès EJ, 2008, IEEE SIGNAL PROC MAG, V25, P21, DOI 10.1109/MSP.2007.914731