Semantic Scholar uses AI to extract papers important to this topic.
The reverse engineering (RE) of electronic chips and systems can be used with honest and dishonest intentions. To inhibit RE for… Expand As system security demands continue to evolve, Physically Unclonable Functions (PUFs) are a promising solution for secure storage… Expand RFID tags are devices of very limited computational capabilities, which only have 250-3K logic gates that can be devoted to… Expand Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as smart labels are emerging as one of the most… Expand A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the authentication process. These… Expand A radio-frequency identification (RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query… Expand A paper published in 1996 examined the problems involved in truly deleting data from magnetic storage media and also made a… Expand The aim of this paper is to give a thorough overview of flash memory cells. Basic operations and charge-injection mechanisms that… Expand Single-event upset was investigated in high-density flash memories from two different manufacturers. Many types of functional… Expand A four-chip system developed for a programmable hearing aid is presented. It combines E/sup 2/PROM (electrically erasable… Expand