From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

EPC Class 1 GEN 2 UHF RFID tag emulator for robustness evaluation and improvement., , и . DTIS, стр. 20-24. IEEE, (2013)On error models for RTL security evaluations., , , , , и . DTIS, стр. 1-6. IEEE, (2014)SHCoT: Secure (and Verified) Hybrid Chain of Trust to Protect from Malicious Software in LightWeight Devices., , и . ISSRE Workshops, стр. 434-439. IEEE, (2019)Security and Reliability Evaluation of Countermeasures implemented using High-Level Synthesis., , , , и . IOLTS, стр. 1-8. IEEE, (2022)An In-Depth Vulnerability Analysis of RISC-V Micro-Architecture Against Fault Injection Attack., , , , , и . DFT, стр. 1-6. IEEE, (2021)CLASA : a Cross-Layer Agent Security Architecture for networked embedded systems., , и . COINS, стр. 1-8. IEEE, (2021)Run-time detection of hardware Trojans: The processor protection unit., , и . ETS, стр. 1-6. IEEE Computer Society, (2013)Laser Fault Injection at the CMOS 28 nm Technology Node: an Analysis of the Fault Model., , , , , , , , , и 3 other автор(ы). FDTC, стр. 1-6. IEEE Computer Society, (2018)A physical unclonable function based on setup time violation., , , и . ICCD, стр. 135-138. IEEE Computer Society, (2012)A secure scan design methodology., , , и . DATE, стр. 1177-1178. European Design and Automation Association, Leuven, Belgium, (2006)