1 |
B. Skori and TU Eindhoven, "Lecture notes: Physical aspects of digital security", 2012.
|
2 |
Ulrich Ruhrmair et al., "Modeling Attacks on Physical Unclonable Functions", CCS'10, October, 2012.
|
3 |
Young Sil Lee, Taeyong Kim, and Hoon Jae Lee, "Mutual Authentication Protocol for Enhanced RFID Security and Anti-Counterfeiting", Proc. of 26th AINA 2012, pp. 558-563, March, 2012.
|
4 |
김태용, 이훈재, "복제 방지용 PUF의 전자계 해석 방안", 한국정보통신학회 2012년 춘계학술대회논문집, pp. 80-82, April, 2012.
|
5 |
Matthew N. O. Sadiku, Numerical techniques in electromagnetics (2nd ed.), CRC Press.
|
6 |
K. S. Kunz and R. J. Luebbers, The Finite Difference Time Domain Method for Electromagnetics, CRC Press.
|