Author of the publication

Guest Editorial: Special Section on Embedded System Security.

, , and . IEEE Embed. Syst. Lett., 7 (1): 1-2 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest Editorial: Special Section on Embedded System Security., , and . IEEE Embed. Syst. Lett., 7 (1): 1-2 (2015)DAP-MAC: A delay-aware probability-based MAC protocol for underwater acoustic sensor networks., and . Ad Hoc Networks, (2016)Side-channel Timing Attack of RSA on a GPU., , and . ACM Trans. Archit. Code Optim., 16 (3): 32:1-32:18 (2019)PIFT: efficient dynamic information flow tracking using secure page allocation., , and . WESS, ACM, (2009)Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers., , , and . SCSS, volume 342 of EPTCS, page 35-48. (2021)A Guessing Entropy-Based Framework for Deep Learning-Assisted Side-Channel Analysis., , and . IEEE Trans. Inf. Forensics Secur., (2023)An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card., , , and . IACR Cryptology ePrint Archive, (2016)Static secure page allocation for light-weight dynamic information flow tracking., , and . CASES, page 27-36. ACM, (2012)A Hierarchical Design of an Application-specific Instruction Set Processor for High-throughput FFT., , and . ISCAS, page 2513-2516. IEEE, (2009)Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs)., , , , and . HASP@ISCA, page 10:1-10:8. ACM, (2014)