In this paper we survey the most important POR schemes proposed since 2007
along with different methods used for various security requirements. through a
comparative study, a consolidated report of the techniques used in POR is presented.
(EL)
Natural Sciences ▶ Computer and Information Sciences Information Systems
(EN)