A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack At CHES 2010, the ...
Blockchain applied to the construction supply chain: A case study with threat model ...
Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing ...
MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors ...
Memristor-based PUF for lightweight cryptographic randomness Physical unclonable functions (PUF) are cryptographic ...