From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A global approach for the improvement of UHF RFID safety and security., , , и . DTIS, стр. 1-2. IEEE, (2017)EPC Class 1 GEN 2 UHF RFID tag emulator for robustness evaluation and improvement., , и . DTIS, стр. 20-24. IEEE, (2013)On error models for RTL security evaluations., , , , , и . DTIS, стр. 1-6. IEEE, (2014)Security Evaluation with an Indoor UWB Localization Open Platform: Acknowledgment Attack Case Study., , и . PIMRC, стр. 1-7. IEEE, (2019)Laser Fault Injection at the CMOS 28 nm Technology Node: an Analysis of the Fault Model., , , , , , , , , и 3 other автор(ы). FDTC, стр. 1-6. IEEE Computer Society, (2018)On the Use of an Oscillation-Based Test Methodology for CMOS Micro-Electro-Mechanical Systems., , , и . DATE, стр. 1120. IEEE Computer Society, (2002)Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities., , , и . NEWCAS, стр. 1-4. IEEE, (2021)Experimental Evaluation of Delayed-Based Detectors Against Power-off Attack., , , , , , , , и . IOLTS, стр. 1-3. IEEE, (2023)Antennas for RFID tags., , и . sOc-EUSAI, стр. 19-22. ACM, (2005)An In-Depth Vulnerability Analysis of RISC-V Micro-Architecture Against Fault Injection Attack., , , , , и . DFT, стр. 1-6. IEEE, (2021)