Author of the publication

Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach.

, , , , , , , and . HOST, page 13-18. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Trojan: Threats and emerging solutions., , and . HLDVT, page 166-171. IEEE Computer Society, (2009)Collective computing based on swarm intelligence., , and . DAC, page 349-350. ACM, (2008)Design and Validation for FPGA Trust under Hardware Trojan Attacks., , , , , and . IEEE Trans. Multi Scale Comput. Syst., 2 (3): 186-198 (2016)Ultra-Low-Power and Robust Digital-Signal-Processing Hardware for Implantable Neural Interface Microsystems., , and . IEEE Trans. Biomed. Circuits Syst., 5 (2): 169-178 (2011)High-temperature (>500°C) reconfigurable computing using silicon carbide NEMS switches., , , , , , , and . DATE, page 1065-1070. IEEE, (2011)Software exploitable hardware Trojans in embedded processor., , , , and . DFT, page 55-58. IEEE Computer Society, (2012)TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection., , , , and . HOST, page 71-74. IEEE Computer Society, (2011)Application of Neural Networks to Biological Data Mining for Automatic Species Identification., , and . IICAI, page 1507-1526. IICAI, (2005)Role of power grid in side channel attack and power-grid-aware secure design., , , , , , , and . DAC, page 78:1-78:9. ACM, (2013)Sequential hardware Trojan: Side-channel aware design and placement., , , , and . ICCD, page 297-300. IEEE Computer Society, (2011)