Filter By:

Journal Check one or more journals to show results from those journals only.

Choose more journals

Article type Check one or more article types to show results from those article types only.
Subject Check one or more subjects to show results from those subjects only.
Date Choose a date option to show results from those dates only.

Custom date range

Clear all filters
Sort by:
Showing 1–1 of 1 results
Advanced filters: Author: Nimesh Shah Clear advanced filters
  • Despite the impressive demonstrations with silicon and oxide memristors, realizing efficient roots of trust for resource-constrained hardware remains a challenge. Here, the authors exploit switching behavior in one dimensional perovskite memristors to design security primitives for key generation and device authentication.

    • Rohit Abraham John
    • Nimesh Shah
    • Nripan Mathews
    ResearchOpen Access
    Nature Communications
    Volume: 12, P: 1-11