Linked e-resources

Details

Introduction
Integrated Circuit Fingerprinting
Novel PUF designs for device Identification
Authentication Protocols: Standards, limitation and research opportunities
Hardware-based Authentication Protocols for better physical security
Energy Efficient Authentication Protocols
Case study 1: Securing Hardware Supply Chain
Case study 2: GPS spoofing attack detection and survival.

Browse Subjects

Show more subjects...

Statistics

from
to
Export