@dblp

Hardware Efficient Authentication based on Random Selection.

, , and . Sicherheit, volume P-228 of LNI, page 169-185. GI, (2014)

Links and resources

Tags