Author of the publication

Protecting RSA Hardware Accelerators against Differential Fault Analysis through Residue Checking.

, , , and . DFT, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification algorithms for governed use of multimedia content., and . Online Inf. Rev., 31 (1): 38-58 (2007)A cost-efficient QoS-aware analytical model of future software content delivery networks., , , , , , and . Int. J. Netw. Manag., (2021)Architectures and Technologies for Adapting Secured Content in Governed Multimedia Applications., , , , , , and . IEEE Multim., 18 (4): 48-61 (2011)Media Contract Formalization Using a Standardized Contract Expression Language., , , and . IEEE Multim., 22 (2): 64-74 (2015)Malicious Website Detection Through Deep Learning Algorithms., , , and . LOD, volume 13163 of Lecture Notes in Computer Science, page 512-526. Springer, (2021)Generation of Standardised Rights Expressions from Contracts: An Ontology Approach?, , , , , and . OTM Workshops, volume 3762 of Lecture Notes in Computer Science, page 836-845. Springer, (2005)Transfer-Learning-Based Intrusion Detection Framework in IoT Networks., , , , , , and . Sensors, 22 (15): 5621 (2022)Protecting RSA Hardware Accelerators against Differential Fault Analysis through Residue Checking., , , and . DFT, page 1-6. IEEE, (2019)Workflow Description of Digital Rights Management Systems., , and . OTM Workshops, volume 3292 of Lecture Notes in Computer Science, page 581-592. Springer, (2004)Trust in Event Reporting Mechanisms for DRM., and . CCNC, page 1058-1062. IEEE, (2007)