Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electromagnetic Induction Attacks Against Embedded Systems., , , , , and . AsiaCCS, page 499-510. ACM, (2018)Device Measurement and Origin of Variation., , and . Digital Fingerprinting, Springer, (2016)ASEE TELPhE Division as a Community of Transformation., and . FIE, page 1-5. IEEE, (2018)Student-mentor views on inquiry-based learning: A challenge for designing effective inquiry-based classes with mentors., and . FIE, page 1-5. IEEE, (2018)On trading wavelengths with fibers: a cost-performance based study., , and . IEEE/ACM Trans. Netw., 12 (5): 944-951 (2004)Disconnected Engineering Education., and . FIE, page 1-3. IEEE, (2021)Case Studies in Applying Design Thinking to Course Design in Computer Engineering., , , , and . FIE, page 1-9. IEEE, (2023)Towards Wireless Spiking of Smart Locks., , , , , and . SP (Workshops), page 251-257. IEEE, (2022)Special session on design metaphors: Rethinking the vocabulary of design education., , and . FIE, page 1-2. IEEE Computer Society, (2015)Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems., , and . SecureComm, volume 106 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 328-348. Springer, (2012)