Research Article

Using Physical Context-Based Authentication against External Attacks: Models and Protocols

Figure 3

The Unique Bitstream Generator counting events example.