Author of the publication

New clone-detection approach for RFID-based supply chains.

, , , and . HOST, page 122-127. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Splitting the Interpose PUF: A Novel Modeling Attack Strategy., , , , , , , and . IACR Cryptology ePrint Archive, (2019)Considerations on the Theory of Training Models with Differential Privacy., and . CoRR, (2023)Optimal Finite-Sum Smooth Non-Convex Optimization with SARAH., , , , , and . CoRR, (2019)Finite-Sum Optimization: A New Perspective for Convergence to a Global Solution., , and . CoRR, (2022)Differential Private Hogwild! over Distributed Local Data Sets., , , , and . CoRR, (2021)Quantifying and Mitigating Privacy Risks for Tabular Generative Models., , , , , and . CoRR, (2024)Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak., , , , and . IACR Cryptol. ePrint Arch., (2021)Besting the Black-Box: Barrier Zones for Adversarial Example Defense., , , , and . IEEE Access, (2022)Path ORAM: An Extremely Simple Oblivious RAM Protocol., , , , , , , and . J. ACM, 65 (4): 18:1-18:26 (2018)A Retrospective on Path ORAM., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (8): 1572-1576 (2020)