Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems., , and . ACM Trans. Internet Techn., 18 (4): 55:1-55:20 (2018)Multiprocessor information concealment architecture to prevent power analysis-based side channel attacks., , , and . IET Comput. Digit. Tech., 5 (1): 1-15 (2011)QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks., , , , and . ACM Trans. Design Autom. Electr. Syst., 26 (5): 33:1-33:36 (2021)Simeon - Secure Federated Machine Learning Through Iterative Filtering., , , , and . CoRR, (2021)Representation and querying of unfair evaluations in social rating systems., , , , , and . Comput. Secur., (2014)Model for Voter Scoring and Best Answer Selection in Community Q&A Services., , , , and . Web Intelligence, page 116-123. IEEE Computer Society, (2009)Reputation management in crowdsourcing systems., , , , , and . CollaborateCom, page 664-671. ICST / IEEE, (2012)Advanced modes in AES: Are they safe from power analysis based side channel attacks?, , , , and . ICCD, page 173-180. IEEE Computer Society, (2014)Collusion Detection in Online Rating Systems., , , , , and . APWeb, volume 7808 of Lecture Notes in Computer Science, page 196-207. Springer, (2013)CoRaS: A multiprocessor key corruption and random round swapping for power analysis side channel attacks: A DES case study., , and . ISCAS, page 253-256. IEEE, (2012)