From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Concurrent Error Detection Schemes for Involution Ciphers., , и . CHES, том 3156 из Lecture Notes in Computer Science, стр. 400-412. Springer, (2004)Power Optimization for Universal Hash Function Data Path Using Divide-and-Concatenate Technique., и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 26 (10): 1763-1769 (2007)Guest Editors' Introduction: Online VLSI Testing., и . IEEE Des. Test Comput., 15 (4): 12-16 (1998)ASSURE: RTL Locking Against an Untrusted Foundry., , , , и . CoRR, (2020)Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks on DNA Fingerprinting and Information Forensics., , , , и . IEEE Trans. Inf. Forensics Secur., (2020)Hardware and embedded security in the context of internet of things., , и . CyCAR@CCS, стр. 61-64. ACM, (2013)Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks., , , и . IEEE Access, (2020)A heterogeneous built-in self-repair approach using system-level synthesis flexibility., , и . IEEE Trans. Reliability, 53 (1): 93-101 (2004)An Energy-Efficient Memristive Threshold Logic Circuit., , , и . IEEE Trans. Computers, 61 (4): 474-487 (2012)Automatic Synthesis of Self-Recovering VLSI Systems., и . IEEE Trans. Computers, 45 (2): 131-142 (1996)