Author:
Škorić Boris,Obi Chibuzo,Verbitskiy Evgeny,Schoenmakers Berry
Subject
Computational Theory and Mathematics,Computer Science Applications,Information Systems,Theoretical Computer Science
Reference23 articles.
1. Computational analogues of entropy;Barak,2003
2. Forgery: ‘fingerprinting’ documents and packaging;Buchanan;Nat. Brief Commun.,2005
3. Universal classes of hash functions;Carter;J. Comput. System Sci.,1979
4. D. Clarke, B. Gassend, M. van Dijk, S. Devadas, Secure hardware processors using silicon physical one-way functions, in: R. Sandu (Ed.), ACM CCS ʼ02, 2002.
5. G. DeJean, D. Kirovski, Radio frequency certificates of authenticity, in: IEEE Antenna and Propagation Symposium – URSI, 2006.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献