Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Process reliability based trojans through NBTI and HCI effects., , , , , and . AHS, page 215-222. IEEE Computer Society, (2010)A supply-demand model based scalable energy management system for improved energy utilization efficiency., , , , , and . Green Computing Conference, page 97-105. IEEE Computer Society, (2010)Cross-correlation of specification and RTL for soft IP analysis., , , , , and . DATE, page 1-6. European Design and Automation Association, (2014)A robust authentication methodology using physically unclonable functions in DRAM arrays., , , , , and . DATE, page 647-652. ACM, (2015)Exploiting Semiconductor Properties for Hardware Trojans, , , , and . CoRR, (2009)Hardware Trojan by Hot Carrier Injection, , , , and . CoRR, (2009)Knowledge-Guided Methodology for Third-Party Soft IP Analysis., , , , , and . VLSID, page 246-251. IEEE Computer Society, (2014)Using codesign techniques to support analog functionality., , , and . CODES, page 79-84. ACM, (1999)A Technique for High Ratio LZW Compression., , , , and . DATE, page 10116-10121. IEEE Computer Society, (2003)An Adaptable Task Manager for Reconfigurable Architecture Kernels., , , and . AHS, page 132-137. IEEE Computer Society, (2009)