From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guided Electromagnetic Wave Technique for IC Authentication., , , , и . Sensors, 20 (7): 2041 (2020)Secure and Flexible Trace-Based Debugging of Systems-on-Chip., , и . ACM Trans. Design Autom. Electr. Syst., 22 (2): 31:1-31:25 (2017)EPC Class 1 GEN 2 UHF RFID tag emulator for robustness evaluation and improvement., , и . DTIS, стр. 20-24. IEEE, (2013)On error models for RTL security evaluations., , , , , и . DTIS, стр. 1-6. IEEE, (2014)Design Space Exploration for Ultra-Low-Energy and Secure IoT MCUs., , , , , и . ACM Trans. Embed. Comput. Syst., 19 (3): 19:1-19:34 (2020)Security and Reliability Evaluation of Countermeasures implemented using High-Level Synthesis., , , , и . IOLTS, стр. 1-8. IEEE, (2022)SHCoT: Secure (and Verified) Hybrid Chain of Trust to Protect from Malicious Software in LightWeight Devices., , и . ISSRE Workshops, стр. 434-439. IEEE, (2019)CLASA : a Cross-Layer Agent Security Architecture for networked embedded systems., , и . COINS, стр. 1-8. IEEE, (2021)An In-Depth Vulnerability Analysis of RISC-V Micro-Architecture Against Fault Injection Attack., , , , , и . DFT, стр. 1-6. IEEE, (2021)Laser Fault Injection at the CMOS 28 nm Technology Node: an Analysis of the Fault Model., , , , , , , , , и 3 other автор(ы). FDTC, стр. 1-6. IEEE Computer Society, (2018)