Author of the publication

Constraints for effective distribution network expansion planning: an ample review.

, , , and . Int. J. Syst. Assur. Eng. Manag., 11 (3): 531-546 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off., , , and . Int. J. Netw. Secur., 15 (3): 219-230 (2013)SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing., , , , and . IEEE Access, (2020)EM SCA White-Box Analysis-Based Reduced Leakage Cell Design and Presilicon Evaluation., , , , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (11): 4927-4938 (2022)Improved EM Side-Channel Analysis Attack Probe Detection Range Utilizing Coplanar Capacitive Asymmetry Sensing., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (12): 4583-4596 (December 2023)PG-CAS: Pro-Active EM-SCA Probe Detection Using Switched-Capacitor-Based Patterned-Ground Co-Planar Capacitive Asymmetry Sensing., , , , , and . IEEE Open J. Circuits Syst., (2023)EM-X-DL: Efficient Cross-device Deep Learning Side-channel Attack With Noisy EM Signatures., , , , , and . ACM J. Emerg. Technol. Comput. Syst., 18 (1): 4:1-4:17 (2022)A novel methodology for the planning of charging infrastructure in the scenario of high EV penetration., , , and . Soft Comput., 27 (9): 5623-5640 (May 2023)Optimization for SPHINCS+ using Intel Secure Hash Algorithm Extensions., , , , , and . IACR Cryptol. ePrint Arch., (2022)A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange., , , , , , and . IACR Cryptol. ePrint Arch., (2021)Cryptographic Capability Computing., , , , , , , , , and 1 other author(s). MICRO, page 253-267. ACM, (2021)