Author of the publication

Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach.

, , , and . Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 102-117. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unified Submodular Framework for Multimodal IC Trojan Detection., , and . Information Hiding, volume 6387 of Lecture Notes in Computer Science, page 17-32. Springer, (2010)On kernel acceleration of electromagnetic solvers via hardware emulation., , , , , , , , and . Comput. Electr. Eng., (2015)Hardware Trojan Protection for Third Party IPs., , , and . DSD, page 662-665. IEEE Computer Society, (2013)Consistency-based characterization for IC Trojan detection., and . ICCAD, page 123-127. ACM, (2009)Dynamic FPGA Detection and Protection of Hardware Trojan: A Comparative Analysis., , , , and . CoRR, (2017)Active Hardware Metering for Intellectual Property Protection and Security., and . USENIX Security Symposium, USENIX Association, (2007)On hardware solution of dense linear systems via Gauss-Jordan Elimination., , and . PACRIM, page 364-369. IEEE, (2015)Trojan Immune Circuits Using Duality.. DSD, page 177-184. IEEE Computer Society, (2012)Accelerating electromagnetic simulations: A hardware emulation approach., , , , and . ICECS, page 592-595. IEEE, (2015)E-Voting Attacks and Countermeasures., , , , and . AINA Workshops, page 269-274. IEEE Computer Society, (2014)