Inproceedings,

Lemonade from Lemons: Harnessing Device Wearout to Create Limited-Use Security Architectures.

, , , and .
ISCA, page 361-374. ACM, (2017)

Meta data

Tags

Users

  • @dblp

Comments and Reviews