Author of the publication

Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy.

, , and . Enterp. Inf. Syst., 10 (9): 1024-1046 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User power-delay budget driven PSO based design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis., and . ISQED, page 289-292. IEEE, (2015)Designing Low-Cost Hardware Accelerators for CE Devices Hardware Matters., , , and . IEEE Consumer Electronics Magazine, 6 (4): 140-149 (2017)Robust Digital Signature to Protect IP Core against Fraudulent Ownership and Cloning., , and . ICCE-Berlin, page 1-3. IEEE, (2019)Biometrics for Hardware Security and Trust: Discussion and Analysis., , and . IT Prof., 25 (4): 36-44 (July 2023)Facial Biometric for Securing Hardware Accelerators., and . IEEE Trans. Very Large Scale Integr. Syst., 29 (1): 112-123 (2021)Multi-cut based architectural obfuscation and handprint biometric signature for securing transient fault detectable IP cores during HLS., and . Integr., (March 2024)Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware., and . IEEE Access, (2019)Functional networks in non-human primate spinal cord and the effects of injury., , , , , , and . NeuroImage, (2021)"Security Gap" as a metric for enterprise business processes., , and . Secur. Priv., (November 2022)Obfuscated Hardware Accelerators for Image Processing Filters - Application Specific and Functionally Reconfigurable Processors., and . IEEE Trans. Consumer Electron., 66 (4): 386-395 (2020)