From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Comprehensive Approach to a Trusted Test Infrastructure., , , , , , , , , и 1 other автор(ы). IVSW, стр. 43-48. IEEE, (2019)Encryption of test data: which cipher is better?, , , , , и . PRIME, стр. 85-88. IEEE, (2018)Providing Confidentiality and Integrity in Ultra Low Power IoT Devices., , , , , и . DTIS, стр. 1-6. IEEE, (2019)SI ECCS: SECure context saving for IoT devices., , , , , и . DTIS, стр. 1-2. IEEE, (2018)SECCS: SECure Context Saving for IoT Devices., , , , , и . CoRR, (2019)Hybrid Protection of Digital FIR Filters., , , , , , и . CoRR, (2023)Development and Application of Embedded Test Instruments to Digital, Analog/RFs and Secure ICs., , , , , , , , , и 5 other автор(ы). IOLTS, стр. 1-4. IEEE, (2020)A New Secure Stream Cipher for Scan Chain Encryption., , , , , и . IVSW, стр. 68-73. IEEE, (2018)Logic Locking: Exploration of a new key-gate based on tristate logic., , , , и . LATS, стр. 1-6. IEEE, (2024)On the limitations of logic testing for detecting Hardware Trojans Horses., , , и . DTIS, стр. 1-5. IEEE, (2015)