From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hardware Security - Design, Threats, and Safeguards., и . CRC Press, (2014)A study of asynchronous design methodology for robust CMOS-nano hybrid system design., и . JETC, 5 (3): 12:1-12:22 (2009)A PUF-based Secure Communication Protocol for IoT., , и . IACR Cryptology ePrint Archive, (2016)A generalized tamper localization approach for reversible watermarking algorithms., и . ACM Trans. Multim. Comput. Commun. Appl., 9 (3): 19:1-19:22 (2013)Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet Transform., , и . InfoSecHiComNet, том 7011 из Lecture Notes in Computer Science, стр. 45-56. Springer, (2011)Reversible Color Image Watermarking in the YCoCg-R Color Space., , и . ICISS, том 9478 из Lecture Notes in Computer Science, стр. 480-498. Springer, (2015)Design of low area-overhead ring oscillator PUF with large challenge space., , и . ReConFig, стр. 1-6. IEEE, (2013)ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch., , , , и . SPACE, том 11947 из Lecture Notes in Computer Science, стр. 159-175. Springer, (2019)A Technique to Evaluate Upper Bounds on Performance of Pixel-prediction Based Reversible Watermarking Algorithms., и . J. Signal Process. Syst., 82 (3): 373-389 (2016)An image forensic technique based on JPEG ghosts., , , и . Multim. Tools Appl., 82 (9): 14153-14169 (апреля 2023)