Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Case study: Detecting hardware Trojans in third-party digital IP cores., and . HOST, page 67-70. IEEE Computer Society, (2011)Defect Tolerance for Molecular Electronics-Based NanoFabrics Using Built-In Self-Test Procedure.. DFT, page 305-313. IEEE Computer Society, (2005)Securing Scan Design Using Lock and Key Technique., , , and . DFT, page 51-62. IEEE Computer Society, (2005)Secure Split-Test for preventing IC piracy by untrusted foundry and assembly., , and . DFTS, page 196-203. IEEE Computer Society, (2013)SCT: An Approach For Testing and Configuring Nanoscale Devices., and . VTS, page 370-377. IEEE Computer Society, (2006)Improving Transition Delay Test Using a Hybrid Method., and . IEEE Des. Test Comput., 23 (5): 402-412 (2006)Trustworthy Hardware: Identifying and Classifying Hardware Trojans., , , and . Computer, 43 (10): 39-46 (2010)Enhanced launch-off-capture transition fault testing., , and . ITC, page 10. IEEE Computer Society, (2005)Critical Paths Selection and Test Cost Reduction Considering Process Variations., and . Asian Test Symposium, page 259-264. IEEE Computer Society, (2013)Analysis of power consumption and transition fault coverage for LOS and LOC testing schemes., , , , , , , , , and . DDECS, page 376-381. IEEE Computer Society, (2010)