Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new BIST architecture for low power circuits., , , and . ETW, page 160-164. IEEE Computer Society, (1999)Mixed public and secret-key cryptography for wireless sensor networks., , and . ICMU, page 1-6. IEEE, (2017)Initializability analysis of synchronous sequential circuits., , , , and . ACM Trans. Design Autom. Electr. Syst., 7 (2): 249-264 (2002)Hierarchical Key Negotiation Technique for Transitory Master Key Schemes in Wireless Sensor Networks., , and . BWCCA, page 151-157. IEEE, (2013)Random key pre-distribution with transitory master key for wireless sensor networks., , and . StudentWorkshop@CoNEXT, page 27-28. ACM, (2009)A portable ATPG tool for parallel and distributed systems., , , , and . VTS, page 29-34. IEEE Computer Society, (1995)A Test Pattern Generation Methodology for Low-Power Consumption., , , and . VTS, page 453-459. IEEE Computer Society, (1998)Analysis of SEU Effects in a Pipelined Processor., , and . IOLTW, page 112-116. IEEE Computer Society, (2002)A New Functional Fault Model for FPGA Application-Oriented Testing., , and . DFT, page 372-380. IEEE Computer Society, (2002)An Integrated Approach for Increasing the Soft-Error Detection Capabilities in SoCs processors., , , , and . DFT, page 445-453. IEEE Computer Society, (2005)