Bemærk: Kan ikke leveres før jul.
This book examines physically unclonable functions in all their facets: the multitude of their physical constructions, the algorithmic and physical properties which describe them, and the techniques required to deploy them in information security applications.