The 10 revised full papers were carefully reviewed and selected from 23 submissions and are organized in topical sections on PUFs and applications, side-channels and countermeasures, RFID system attacks, and efficient implementations.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.