Abstract: This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications. First, it motivates the use of PUFs versus conventional ...
Abstract: This paper considers models and algorithms for interactive sensing in social networks in which individuals act as sensors and the information exchange between individuals is exploited to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results