RFID Systems and Security and Privacy Implications
Outline Introduction Related Work PUF-Based Tag Identification Algorithm PUF-Based MAC Protocols PUF Vs. Digital Hash Functions Building PUFs.
Physically Unclonable Function-based Security And Privacy In RFID Systems