Author of the publication

Fingerprinting Digital Circuits on Programmable Hardware.

, , and . Information Hiding, volume 1525 of Lecture Notes in Computer Science, page 16-31. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Book review: Intellectual property protection in VLSI designs: Theory and practice, Hardcover, pp 183, plus XIX, Kluwer Academic Publishers, Boston, 2003, ISBN 1-4020-7320-8., , and . Microelectron. Reliab., 44 (4): 705-706 (2004)Fault-Tolerant and Low-Power Sampling Schedules for Localized BASNs., and . IEEE J. Emerg. Sel. Topics Circuits Syst., 3 (1): 86-95 (2013)Scheduling Algorithms For Hierarchical Data Control Flow Graphs., and . I. J. Circuit Theory and Applications, 20 (3): 217-233 (1992)Sequential Circuit Delay optimization Using Global Path Delays., , , and . DAC, page 483-489. ACM Press, (1993)Consistency-Based On-line Localization in Sensor Networks., , and . DCOSS, volume 4026 of Lecture Notes in Computer Science, page 529-545. Springer, (2006)Optimal ILP-Based Approach for Throughput Optimization Using Simultaneous Algorithm/Architecture Matching and Retiming., , and . DAC, page 113-118. ACM Press, (1995)Engineering Change: Methodology and Applications to Behavioral and System Synthesis., and . DAC, page 604-609. ACM Press, (1999)Enhanced FPGA reliability through efficient run-time fault reconfiguration., , and . IEEE Trans. Reliab., 49 (3): 296-304 (2000)Energy attacks and defense techniques for wireless systems., , and . WISEC, page 185-194. ACM, (2013)Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach., , , and . Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 102-117. Springer, (2008)