Author of the publication

Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin.

, , , , and . HOST, page 111-121. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin., , , , and . HOST, page 111-121. IEEE, (2020)Intelligent Recognition of Spontaneous Expression Using Motion Magnification of Spatio-temporal Data., , , and . PAISI, volume 9650 of Lecture Notes in Computer Science, page 114-128. Springer, (2016)Exploiting DRAM Latency Variations for Generating True Random Numbers., , , , and . ICCE, page 1-6. IEEE, (2019)Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips., , and . IEEE Trans. Inf. Forensics Secur., (2024)A Noninvasive Technique to Detect Authentic/Counterfeit SRAM Chips., , and . ACM J. Emerg. Technol. Comput. Syst., 19 (2): 11:1-11:25 (April 2023)Approximate MRAM: High-performance and Power-efficient Computing with MRAM Chips for Error-tolerant Applications., , and . CoRR, (2021)Q-Nerve: Propagating signal of a damaged nerve using quantum networking., , , , , , and . NSysS, page 1-10. IEEE, (2015)Independent detection of recycled flash memory: Challenges and solutions., , , , and . HOST, page 89-95. IEEE Computer Society, (2018)A New Method to Prevent Unintentional Child Poisoning., , , and . EMBC, page 5142-5145. IEEE, (2018)Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics †., , , , and . Cryptogr., 2 (3): 17 (2018)