Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet., , , , and . WESS, page 1:1-1:8. ACM, (2014)Document Processing: Methods for Semantic Text Similarity Analysis., , and . INISTA, page 1-6. IEEE, (2020)Time-multiplexed System-on-Chip using Fault-tolerant Astrocyte-Neuron Networks., , , , , , , , and . SSCI, page 1076-1083. IEEE, (2018)A Novel Attack on a FPGA based True Random Number Generator., , and . WESS, page 6. ACM, (2015)Remote Dynamic Clock Reconfiguration Based Attacks on Internet of Things Applications., , , and . DSD, page 431-438. IEEE Computer Society, (2016)New Avenues for Automated Railway Safety Information Processing in Enterprise Architecture: An NLP Approach., , , and . IEEE Access, (2023)Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things., , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 21-28. IEEE, (2019)LoRa-PUF: A Two-Step Security Solution for LoRaWAN., , and . VTC2023-Spring, page 1-6. IEEE, (2023)A Multi-layer Security Model for 5G-Enabled Industrial Internet of Things., , , , and . iSCI, volume 1122 of Communications in Computer and Information Science, page 279-292. Springer, (2019)Autonomous Learning Paradigm for Spiking Neural Networks., , , , , , , , , and . ICANN (1), volume 11727 of Lecture Notes in Computer Science, page 737-744. Springer, (2019)