Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning., , , , , and . CoRR, (2022)Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond., , , , , , and . ICISSP, page 583-591. SciTePress, (2023)Attacking Delay-based PUFs with Minimal Adversary Model., , , , and . CoRR, (2024)PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)A Generic Obfuscation Framework for Preventing ML-Attacks on Strong-PUFs through Exploitation of DRAM-PUFs., , , , , and . EuroS&P, page 92-106. IEEE, (2023)A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things., , and . IEEE Trans. Ind. Informatics, 18 (3): 1971-1980 (2022)PhenoAuth: A Novel PUF-Phenotype-based Authentication Protocol for IoT Devices., , , , and . CoRR, (2024)A Modular Open-Source Cryptographic Co-Processor for Internet of Things., , , , , and . DSD, page 251-259. IEEE, (2023)A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers., , , , , , and . HOST, page 326-336. IEEE, (2023)A provably secure authentication scheme for RFID-enabled UAV applications., , and . Comput. Commun., (2021)