Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic hash for multimedia information., , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410Y. SPIE, (2010)An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks., , and . IEEE Trans. Inf. Forensics Secur., 7 (2): 717-730 (2012)A 100-Gbps Fault-Injection Attack-Resistant AES-256 Engine With 99.1%-99.99% Error Coverage in Intel 4 CMOS., , , , , and . IEEE J. Solid State Circuits, 59 (1): 79-89 (January 2024)Generalized traitor tracing for nested codes., and . ICME, page 561-564. IEEE Computer Society, (2008)Modeling and analysis of Electric Network Frequency signal for timestamp verification., , and . WIFS, page 67-72. IEEE, (2012)"Seeing" ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing., , , and . IEEE Trans. Inf. Forensics Secur., 8 (9): 1417-1432 (2013)Gradient descent approach for secure localization in resource constrained wireless sensor networks., , and . ICASSP, page 1854-1857. IEEE, (2010)Secure video processing: Problems and challenges., , and . ICASSP, page 5856-5859. IEEE, (2011)A gradient descent based approach to secure localization in mobile sensor networks., , and . ICASSP, page 1869-1872. IEEE, (2012)Modeling and analysis of content identification., and . ICME, page 1528-1531. IEEE, (2009)