Skip to main content
. 2022 Jul 7;22(14):5119. doi: 10.3390/s22145119

Figure 5.

Figure 5

Authentication Using Physical Unclonable Functions.