1. Lecture notes in computer science (LNCS);A. Bogdanov,2011
2. Bolotnyy, L., & Robins, G. (2007). Physically unclonable function-based security and privacy in RFID systems. In IEEE international conference on pervasive computing and communications—PERCOM 2007 (pp. 211–220). New York: IEEE.
3. Bose, R. C., & Ray-Chaudhuri, D. K. (1960). On a class of error correcting binary group codes. Information and Control, 3(1), 68–79.
4. Boyen, X. (2004). Reusable cryptographic fuzzy extractors. In ACM conference on computer and communications security—CCS 2004 (pp. 82–91). New York: ACM.
5. Burr, A. (2001). Modulation and coding for wireless communications. Upper Saddle River: Pearson.