The electronic part supply chain and risks of counterfeit parts in defense applications Components and Packaging Technologies, IEEE Transactions on, vol.29, issue.3, pp.703-705, 2006. ,
Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications, 2008 IEEE International Conference on RFID, 2008. ,
DOI : 10.1109/RFID.2008.4519377
Bootstrapping trust in commodity computers, Security and Privacy (SP), 2010. ,
Direct anonymous attestation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, 2004. ,
DOI : 10.1145/1030083.1030103
On the automatic establishment of security relations for devices, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management. IFIP/IEEE, 2013. ,
Design and implementation of a tcg-based integrity measurement architecture, Proceedings of the 13th conference on USENIX Security Symposium, pp.16-16, 2004. ,
Integrating trust establishment into routing protocols of today's MANETs, 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp.1403-1408, 2013. ,
DOI : 10.1109/WCNC.2013.6554931