From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An efficient HMAC processor based on the SHA-3 HASH function., , и . ASICON, стр. 252-255. IEEE, (2017)Double Sieve Collision Attack Based on Bitwise Detection., , и . KSII Trans. Internet Inf. Syst., 9 (1): 296-308 (2015)A Battery-less Tire Pressure Monitoring System., , , , и . ICCVE, стр. 222-225. IEEE Computer Society, (2012)A Novel Detection Algorithm for Ring Oscillator Network Based Hardware Trojan Detection with Tactful FPGA Implementation., , и . CIS, стр. 299-302. IEEE Computer Society, (2015)Design and Implementation of an Electromagnetic Analysis System for Smart Cards., , , и . CIS, стр. 653-656. IEEE Computer Society, (2011)A passive UHF tag for RFID-based train axle temperature measurement system., , , , , , и . CICC, стр. 1-4. IEEE, (2011)Efficient collision attacks on smart card implementations of masked AES., , , , , , и . Sci. China Inf. Sci., 58 (5): 1-15 (2015)Hardware Implementation Based on Contact IC Card Scalar Multiplication., , , , и . CSPS, том 571 из Lecture Notes in Electrical Engineering, стр. 1344-1352. Springer, (2019)Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection Method., , , и . BigDataSE, стр. 96-103. IEEE, (2020)A High-precision Current Detection Circuit for Battery Management System., , , , , и . ASICON, стр. 1-4. IEEE, (2023)