Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy-ART based adaptive digital watermarking scheme., , and . IEEE Trans. Circuits Syst. Video Techn., 15 (1): 65-81 (2005)A generalized perceptual time-frequency subtraction method for speech enhancement., and . ISCAS, IEEE, (2006)Watermarking for IP Protection through Template Substitution at Logic Synthesis Level., and . ISCAS, page 3687-3690. IEEE, (2007)A novel hybrid pass logic with static CMOS output drive full-adder cell., , and . ISCAS (5), page 317-320. IEEE, (2003)PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications., , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3299-3316 (July 2023)Emerging Attacks and Solutions for Secure Hardware in the Internet of Things., , , and . IEEE Trans. Dependable Secur. Comput., 16 (3): 373-375 (2019)Radio Frequency Fingerprints vs. Physical Unclonable Functions - Are They Twins, Competitors, or Allies?, , , and . IEEE Netw., 36 (6): 68-75 (2022)Identification of FSM State Registers by Analytics of Scan-Dump Data., , , and . IEEE Trans. Inf. Forensics Secur., (2021)A Pragmatic Per-Device Licensing Scheme for Hardware IP Cores on SRAM-Based FPGAs., and . IEEE Trans. Inf. Forensics Secur., 9 (11): 1893-1905 (2014)Minimization of k-Variable-Mixed-Polarity Reed-Muller Expansions., and . VLSI Design, 11 (4): 311-320 (2000)