From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration., и . J. Hardw. Syst. Secur., 7 (4): 147-164 (декабря 2023)Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives., , , , , , , , , и . CoRR, (2020)Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones., , , , , и . PROOFS, том 11 из Kalpa Publications in Computing, стр. 33-48. EasyChair, (2019)HT-EMIS: A Deep Learning Tool for Hardware Trojan Detection and Identification through Runtime EM Side-Channels., , , и . ACM Great Lakes Symposium on VLSI, стр. 51-56. ACM, (2023)Self-timed Sensors for Detecting Static Optical Side Channel Attacks., , , и . ISQED, стр. 1-6. IEEE, (2022)ASHES '23: Workshop on Attacks and Solutions in Hardware Security., , , и . CCS, стр. 3664-3665. ACM, (2023)Hardware security meets biometrics for the age of IoT., , , и . ISCAS, стр. 1318-1321. IEEE, (2016)Hierarchical Bloom Filter Framework for Security, Space-efficiency, and Rapid Query Handling in Biometric Systems., , , и . BTAS, стр. 1-8. IEEE, (2019)Tracking Data Flow at Gate-Level through Structural Checking., , , , и . ACM Great Lakes Symposium on VLSI, стр. 185-189. ACM, (2016)A Metal-Via Resistance Based Physically Unclonable Function with 1.18% Native Instability., , , и . CICC, стр. 1-4. IEEE, (2019)