Abstract: This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications. First, it motivates the use of PUFs versus conventional ...
Abstract: This paper considers models and algorithms for interactive sensing in social networks in which individuals act as sensors and the information exchange between individuals is exploited to ...