Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extraction of intrinsic structure for Hardware Trojan detection., , and . IACR Cryptology ePrint Archive, (2015)Correlation-based imaging of fast moving objects using a sparse network of passive receivers., , , and . ACSSC, page 1618-1622. IEEE, (2018)Pelvic motion measurement during over ground walking, analysis and implementation on the WalkTrainer reeducation device., , , , , , , and . IROS, page 2362-2367. IEEE, (2008)Pelvic motion implementation on the WalkTrainer., , , , , and . ROBIO, page 133-138. IEEE, (2007)Under the Dome: Preventing Hardware Timing Information Leakage., , , and . CARDIS, volume 13173 of Lecture Notes in Computer Science, page 233-253. Springer, (2021)Adaptive Masking: a Dynamic Trade-off between Energy Consumption and Hardware Security., , , , and . ICCD, page 559-566. IEEE, (2019)On-chip fingerprinting of IC topology for integrity verification., , and . DATE, page 133-138. IEEE, (2016)Template Attacks against ECC: practical implementation against Curve25519., , and . HOST, page 13-22. IEEE, (2020)SEMBA: A SEM based acquisition technique for fast invasive Hardware Trojan detection., , , and . ECCTD, page 1-4. IEEE, (2015)SWARD: A Secure WAke-up RaDio against Denial-of-Service on IoT devices., , , and . WISEC, page 190-195. ACM, (2018)