Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Key Negotiation Technique for Transitory Master Key Schemes in Wireless Sensor Networks., , and . BWCCA, page 151-157. IEEE, (2013)Mixed public and secret-key cryptography for wireless sensor networks., , and . ICMU, page 1-6. IEEE, (2017)Initializability analysis of synchronous sequential circuits., , , , and . ACM Trans. Design Autom. Electr. Syst., 7 (2): 249-264 (2002)A new BIST architecture for low power circuits., , , and . ETW, page 160-164. IEEE Computer Society, (1999)Random key pre-distribution with transitory master key for wireless sensor networks., , and . StudentWorkshop@CoNEXT, page 27-28. ACM, (2009)Using Infrastructure IPs to Support SW-Based Self-Test of Processor Cores., , and . MTV, page 22-27. IEEE Computer Society, (2004)An Integrated Approach for Increasing the Soft-Error Detection Capabilities in SoCs processors., , , , and . DFT, page 445-453. IEEE Computer Society, (2005)A New Functional Fault Model for FPGA Application-Oriented Testing., , and . DFT, page 372-380. IEEE Computer Society, (2002)A portable ATPG tool for parallel and distributed systems., , , , and . VTS, page 29-34. IEEE Computer Society, (1995)A Test Pattern Generation Methodology for Low-Power Consumption., , , and . VTS, page 453-459. IEEE Computer Society, (1998)