Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defect detection under Realistic Leakage Models using Multiple IDDQ Measurement., , and . ITC, page 319-328. IEEE Computer Society, (2004)Novel Offset Techniques for Improving Bitstring Quality of a Hardware-Embedded Delay PUF., , and . IEEE Trans. Very Large Scale Integr. Syst., 26 (4): 733-743 (2018)Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution., , , , , , and . IEEE Des. Test, 30 (3): 6-17 (2013)On detecting delay anomalies introduced by hardware trojans., , , , and . ICCAD, page 44. ACM, (2016)IP-level implementation of a resistance-based physical unclonable function., and . HOST, page 64-69. IEEE Computer Society, (2014)Self-authenticating secure boot for FPGAs., , , , and . HOST, page 221-226. IEEE Computer Society, (2018)Reinforcement Learning Toward Decision-Making for Multiple Trusted-Third-Parties in PUF-Cash., , , and . WF-IoT, page 1-6. IEEE, (2020)UAV-enabled Human Internet of Things., , , and . DCOSS, page 312-319. IEEE, (2020)Secure Design Flow of FPGA Based RISC-V Implementation., , , , , and . IVSW, page 37-42. IEEE, (2019)Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system., , and . DAC, page 240-243. ACM, (2010)