Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

(Invited Paper) on the Security of Blockchain Consensus Protocols., , , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 465-480. Springer, (2018)Prevention of Fault Attacks in Cellular Automata Based Stream Ciphers., , and . J. Cell. Autom., 12 (1-2): 141-157 (2016)Better Late than Never; Scaling Computation in Blockchains by Delaying Execution., , , , and . CoRR, (2020)Design of 4-Bit Array Multiplier Using Multi-wall Carbon Nanotube Interconnects., , and . ISED, page 208-212. IEEE, (2012)Analyzing power-thermal-performance trade-offs in a high-performance 3D NoC architecture., , and . Integr., (2019)Reliability assessment of stochastic dynamical systems using physics informed neural network based PDEM., and . Reliab. Eng. Syst. Saf., (March 2024)Assessment of attention and working memory among young adults using computer games., , , , , and . J. Ambient Intell. Humaniz. Comput., 14 (3): 2413-2428 (March 2023)An asymptotically unbiased weighted least squares estimation criterion for parametric variograms of second order stationary geostatistical processes., , and . Commun. Stat. Simul. Comput., 49 (7): 1839-1854 (2020)Rapid Comparison of Protein Binding Site Surfaces with Property Encoded Shape Distributions., , and . J. Chem. Inf. Model., 49 (12): 2863-2872 (2009)Testing of Prebond Through Silicon Vias., , and . IEEE Des. Test, 37 (4): 27-34 (2020)