搜索结果: 1-3 共查到“re-use”相关记录3条 . 查询时间(0.065 秒)
Possibilities and Impossibilities for PUF Protocols under PUF Re-Use and PUFs-inside-PUFs Attacks
Physical Unclonable Functions Cryptographic Protocols
2016/3/23
We continue investigations on the use of so-called Strong PUFs as a cryptographic primitive in realistic attack models. We focus on two scenarios: Firstly, the {\it PUF re-use model}, where PUFs are b...
Greyfield Adaptive Re-use: Applying a matrix of contemporary theory to a real site in Springfield, MA
Greyfield Adaptive Re-use Springfield
2014/12/8
New neighborhood and home construction since World War II has been rapid and sprawling. Development companies have used increasingly efficient modular plans and construction techniques to design, grad...