From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Novel Offset Techniques for Improving Bitstring Quality of a Hardware-Embedded Delay PUF., , и . IEEE Trans. Very Large Scale Integr. Syst., 26 (4): 733-743 (2018)A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time., , и . IEEE Trans. Very Large Scale Integr. Syst., 20 (1): 112-125 (2012)An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities., , , и . IEEE Trans. Inf. Forensics Secur., 6 (3-2): 1170-1179 (2011)Node Monitoring as a Fault Detection Countermeasure against Information Leakage within a RISC-V Microprocessor., , , , и . Cryptogr., 6 (3): 38 (2022)Information Leakage Analysis Using a Co-Design-Based Fault Injection Technique on a RISC-V Microprocessor., , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (3): 438-451 (2022)Secure LoRa Firmware Update with Adaptive Data Rate Techniques., , , и . Sensors, 21 (7): 2384 (2021)Defect detection under Realistic Leakage Models using Multiple IDDQ Measurement., , и . ITC, стр. 319-328. IEEE Computer Society, (2004)Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution., , , , , , и . IEEE Des. Test, 30 (3): 6-17 (2013)IP-level implementation of a resistance-based physical unclonable function., и . HOST, стр. 64-69. IEEE Computer Society, (2014)Self-authenticating secure boot for FPGAs., , , , и . HOST, стр. 221-226. IEEE Computer Society, (2018)