Return to Article Details Computer Security by Hardware-Intrinsic Authentication Download Download PDF