Author of the publication

A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices

, , and . Mediterranean Conference on Embedded Computing (MECO); IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Calibratable Detector for Invasive Attacks., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (5): 1067-1079 (2019)A Second Look at the ASCAD Databases., , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 75-99. Springer, (2022)Counteract Side-Channel Analysis of Neural Networks by Shuffling., , and . DATE, page 1305-1310. IEEE, (2022)Efficient Hardware/Software Co-Design for Post-Quantum Crypto Algorithm SIKE on ARM and RISC-V based Microcontrollers., , and . ICCAD, page 35:1-35:9. IEEE, (2020)A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts., , , and . ICCAD, page 69:1-69:9. ACM, (2022)EMDRIVE Architecture: Embedded Distributed Computing and Diagnostics from Sensor to Edge., , , , , , , , , and 24 other author(s). DATE, page 1-6. IEEE, (2024)ScanCamouflage: Obfuscating Scan Chains with Camouflaged Sequential and Logic Gates., , , , , and . DATE, page 1-2. IEEE, (2024)Open Source Hardware Design and Hardware Reverse Engineering: A Security Analysis., , , , and . DSD, page 504-512. IEEE, (2022)Golden Model-Free Hardware Trojan Detection by Classification of Netlist Module Graphs., , and . DATE, page 1317-1322. IEEE, (2022)TimingCamouflage+: Netlist Security Enhancement with Unconventional Timing (with Appendix)., , , , , , , and . CoRR, (2020)