Author of the publication

New clone-detection approach for RFID-based supply chains.

, , , and . HOST, page 122-127. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Synchronized Hardware Trojan Attacks in Smart Grids., , , , and . SPSR-SG@CPSWeek, page 35-40. ACM, (2017)Phase calibrated ring oscillator PUF design and implementation on FPGAs., , , and . FPL, page 1-8. IEEE, (2017)Advancing the State-of-the-Art in Hardware Trojans Design., , and . CoRR, (2016)Comments on "Defeating HaTCh: Building Malicious IP Cores"., , and . CoRR, (2018)Intrinsically Reliable and Lightweight Physical Obfuscated Keys, , , , , , , , , and 1 other author(s). (2017)Weak-Unforgeable Tags for Secure Supply Chain Management., , , , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 80-98. Springer, (2018)The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (4): 243-290 (2019)Secure and Efficient Initialization and Authentication Protocols for SHIELD., and . IEEE Trans. Dependable Secur. Comput., 16 (1): 156-173 (2019)NREPO: Normal basis Recomputing with Permuted Operands., , , and . HOST, page 118-123. IEEE Computer Society, (2014)HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data., , , and . IACR Cryptol. ePrint Arch., (2019)