From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hardware and embedded security in the context of internet of things., , и . CyCAR@CCS, стр. 61-64. ACM, (2013)Securing pressure measurements using SensorPUFs., , и . ISCAS, стр. 1330-1333. IEEE, (2016)Towards a comprehensive and systematic classification of hardware Trojans., , , , и . ISCAS, стр. 1871-1874. IEEE, (2010)An Energy-Efficient Memristive Threshold Logic Circuit., , , и . IEEE Trans. Computers, 61 (4): 474-487 (2012)Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks on DNA Fingerprinting and Information Forensics., , , , и . IEEE Trans. Inf. Forensics Secur., (2020)Concurrent Error Detection Schemes for Involution Ciphers., , и . CHES, том 3156 из Lecture Notes in Computer Science, стр. 400-412. Springer, (2004)Vertical IP Protection of the Next-Generation Devices: Quo Vadis?, , , , , , , , , и . DATE, стр. 1905-1914. IEEE, (2021)Process-Aware Side Channel Shaping and Watermarking for Cyber-Physical Systems., , , и . ACC, стр. 386-391. IEEE, (2018)Security engineering of nanostructures and nanomaterials., , , , и . ICCAD, стр. 11. ACM, (2016)A security imbedded authentication protocol.. INFOCOM, стр. 1105-1109. IEEE, (1988)