Author of the publication

Design Techniques for Enhancing Hardware-Oriented Security Using Obfuscation.

. University of Maryland, College Park, MD, USA, (2021)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/27359).

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated myocardial infarction identification based on interbeat variability analysis of the photoplethysmographic data., , , and . Biomed. Signal Process. Control., (2020)Frequency Throttling Side-Channel Attack., , , and . CCS, page 1977-1991. ACM, (2022)TimingSAT: timing profile embedded SAT attack., , and . ICCAD, page 6. ACM, (2018)On the Evolution of Finite-Sized Complex Networks with Constrained Link Addition., , and . ANTS, page 1-6. IEEE, (2018)On spectral analysis of node centralities., , and . ANTS, page 1-5. IEEE, (2016)ACTM: API Call Transition Matrix-based Malware Detection Method., , , , and . ANTS, page 1-6. IEEE, (2018)Communication overhead of an OpenFlow wireless mesh network., , and . IEEE ANTS, page 1-6. IEEE, (2014)An Efficient Scheme for Constructing Small-World Machine-to-Machine Networks., , and . ICC, page 1-6. IEEE, (2020)Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks?, , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 14-27. Springer, (2014)Corporate Linkages and Financial Performance: A Complex Network Analysis of Indian Firms., , , and . IEEE Trans. Comput. Soc. Syst., 7 (2): 339-351 (2020)