Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and PrIvacy foR the Internet of Things: an overview of the project., , , , , , , , , and 4 other author(s). SMC, page 3993-3998. IEEE, (2019)A Machine Learning Method For Sensor Authentication Using Hidden Markov Models., , and . EST, page 1-5. IEEE, (2019)Multi-factor authentication using accelerometers for the Internet-of-Things., , and . EST, page 103-107. IEEE, (2017)On Quaternary 1-of-4 ID Generator Circuits., , and . AHS, page 323-326. IEEE, (2018)Improving the Security of Dual-Rail Circuits., , , and . CHES, volume 3156 of Lecture Notes in Computer Science, page 282-297. Springer, (2004)Power-balanced asynchronous logic., and . ECCTD, page 213-216. IEEE, (2005)Standard cell and full custom power-balanced logic : ASIC implementation.. University of Newcastle Upon Tyne, UK, (2008)British Library, EThOS.A unique and robust single slice FPGA identification generator., , and . ISCAS, page 1223-1226. IEEE, (2014)Self-Timed Physically Unclonable Functions., , , , , and . NTMS, page 1-5. IEEE, (2012)Asynchronous Physical Unclonable Functions - AsyncPUF.. MCSS, volume 287 of Communications in Computer and Information Science, page 230-241. Springer, (2012)