Author of the publication

Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SACCI: Scan-Based Characterization Through Clock Phase Sweep for Counterfeit Chip Detection., , and . IEEE Trans. Very Large Scale Integr. Syst., 23 (5): 831-841 (2015)NEMTronics: Symbiotic integration of nanoelectronic and nanomechanical devices for energy-efficient adaptive computing., , , and . NANOARCH, page 210-217. IEEE Computer Society, (2011)Role of power grid in side channel attack and power-grid-aware secure design., , , , , , , and . DAC, page 78:1-78:9. ACM, (2013)Sequential hardware Trojan: Side-channel aware design and placement., , , , and . ICCD, page 297-300. IEEE Computer Society, (2011)Hardware Trojan attacks in embedded memory., , , , and . VTS, page 1-6. IEEE Computer Society, (2018)Content Delivery for High-Speed Railway via Integrated Terrestrial-Satellite Networks., , , , and . WCNC, page 1-6. IEEE, (2020)Security Path Verification Through Joint Information Flow Analysis., , and . APCCAS, page 415-418. IEEE, (2018)Property specific information flow analysis for hardware security verification., , , , and . ICCAD, page 89. ACM, (2018)Leveraging Unspecified Functionality in Obfuscated Hardware for Trojan and Fault Attacks., , , and . AsianHOST, page 1-6. IEEE, (2019)Improving IC Security Against Trojan Attacks Through Integration of Security Monitors., , , , and . IEEE Des. Test Comput., 29 (5): 37-46 (2012)