Physically Unclonable Functions (PUFs): Applications, Models, and Future Directi
40,61 €
These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Solutions solely based on software can never ensure their own integrity and trustworthiness while resource-constraints and economic factors often prevent the integration of sophisticated security hardware and cryptographic co-processors.
Jetzt bei Ebay: