Author of the publication

Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC.

, , , , and . SmartIoT, page 229-236. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NP Optimization Problems in Datalog., and . ILPS, page 181-195. MIT Press, (1997)Enhanced User Search Activity by Big Data Tools., , , and . SEBD, page 206-213. Matematicamente.it, (2016)CalcuList: a Functional Language Extended with Imperative Features., and . CoRR, (2018)Implementation of Recursive Queries for a Data Language Based on Pure Horn Logic., and . ICLP, page 104-135. MIT Press, (1987)Properties of Database Schemata with Functional Dependencies., , and . PODS, page 19-28. ACM, (1984)Hierarchical binary histograms for summarizing multi-dimensional data., , , and . SAC, page 598-603. ACM, (2005)Preface., , and . Business Process Management Workshops, volume 4103 of Lecture Notes in Computer Science, page 77-79. Springer, (2006)Deterministic and Non-Deterministic Stable Model Semantics for Unbound DATALOG Queries.. ICDT, volume 893 of Lecture Notes in Computer Science, page 353-367. Springer, (1995)PUF-based Smart Tags for Supply Chain Management., , , , and . ARES, page 41:1-41:7. ACM, (2021)Partial Semantics for Disjunctive Deductive Databases., , and . DEXA, volume 1134 of Lecture Notes in Computer Science, page 564-573. Springer, (1996)