Reference79 articles.
1. S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini, Security, privacy and trust in Internet of Things: The road ahead. Comput. Networks 76, 146–164 (2015).
https://doi.org/10.1016/J.COMNET.2014.11.008
2. D. Evans, The internet of things: how the next evolution of the internet is changing everything. Cisco Internet Bus. Solut. Gr. 1(2011), 1–11 (2011)
3. H. Handschuh, G.-J. Schrijen, P. Tuyls, Hardware intrinsic security from physically unclonable functions, in Towards Hardware-Intrinsic Security, ed. by A.-R. Sadeghi, D. Naccache (Springer, Berlin Heidelberg, Germany, 2010), pp. 39–53
4. C. Herder, M.D. Yu, F. Koushanfar, S. Devadas, Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126–1141 (2014).
https://doi.org/10.1109/JPROC.2014.2320516
5. Q. Xiao, T. Gibbons, H. Lebrun, RFID technology, security vulnerabilities, and countermeasures, in Supply Chain the Way to Flat Organisation, ed. by Y. Huo, F. Jia (InTech, Vienna, Austria, 2009), p. 404
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献