Author:
Guajardo Jorge,Škorić Boris,Tuyls Pim,Kumar Sandeep S.,Bel Thijs,Blom Antoon H. M.,Schrijen Geert-Jan
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference82 articles.
1. Anderson, R., Chan, H., & Perrig, A. (2004). Key infection: Smart trust for smart dust. In IEEE international conference on network protocols — ICNP 2004 (pp. 206–215). IEEE Computer Society, 5–8 October.
2. Balfanz, D., Smetters, D. K., Stewart, P., & Chi Wong, H. (2002). Talking to strangers: Authentication in ad-hoc wireless networks. In Network and distributed system security symposium — NDSS 2002.
3. Bellaouar, A., & Elmasry, M. I. (1995). Low-power digital VLSI design. Circuits and systems (1st ed.). Dordrecht: Kluwer Academic.
4. LNCS;M. Bellare,1993
5. Bhavnagarwala, A. J., Tang, X., & Meindl, J. D. (2001). The impact of intrinsic device fluctuations on CMOS SRAM cell stability. IEEE Journal of Solid-State Circuits, 36(4), 658–665, April.
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献