Author of the publication

Hardware Trojan Detection Using the Order of Path Delay.

, , , and . ACM J. Emerg. Technol. Comput. Syst., 14 (3): 33:1-33:23 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concurrent Error Detection Schemes for Involution Ciphers., , and . CHES, volume 3156 of Lecture Notes in Computer Science, page 400-412. Springer, (2004)Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks on DNA Fingerprinting and Information Forensics., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Power Optimization for Universal Hash Function Data Path Using Divide-and-Concatenate Technique., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 26 (10): 1763-1769 (2007)ASSURE: RTL Locking Against an Untrusted Foundry., , , , and . CoRR, (2020)Hardware and embedded security in the context of internet of things., , and . CyCAR@CCS, page 61-64. ACM, (2013)ASSURE: RTL Locking Against an Untrusted Foundry., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (7): 1306-1318 (2021)Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks., , , and . IEEE Access, (2020)Cybersecurity Road Map for Digital Manufacturing., , and . Computer, 53 (9): 80-84 (2020)Hack3D: Crowdsourcing the Assessment of Cybersecurity in Digital Manufacturing., , , , , , and . Computer, 54 (11): 58-67 (2021)Fault Analysis-Based Logic Encryption., , , , , , and . IEEE Trans. Computers, 64 (2): 410-424 (2015)