From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design-for-test approach of an asynchronous network-on-chip architecture and its associated test pattern generation and application., , , , и . IET Comput. Digit. Tech., 3 (5): 487-500 (2009)A global approach for the improvement of UHF RFID safety and security., , , и . DTIS, стр. 1-2. IEEE, (2017)EPC Class 1 GEN 2 UHF RFID tag emulator for robustness evaluation and improvement., , и . DTIS, стр. 20-24. IEEE, (2013)Fault Injection on Hidden Registers in a RISC-V Rocket Processor and Software Countermeasures., , , и . DATE, стр. 252-255. IEEE, (2019)On error models for RTL security evaluations., , , , , и . DTIS, стр. 1-6. IEEE, (2014)Security Evaluation with an Indoor UWB Localization Open Platform: Acknowledgment Attack Case Study., , и . PIMRC, стр. 1-7. IEEE, (2019)Impact of Technology Spreading on MEMS design Robustness., , , , , , и . VLSI-SOC, том 218 из IFIP Conference Proceedings, стр. 241-251. Kluwer, (2001)Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks., , , , , и . Sensors, 21 (17): 5824 (2021)Microarchitecture-aware Fault Models: Experimental Evidence and Cross-Layer Inference Methodology., , , , и . DTIS, стр. 1-6. IEEE, (2021)Antennas for RFID tags., , и . sOc-EUSAI, стр. 19-22. ACM, (2005)