Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trustworthy proofs for sensor data using FPGA based physically unclonable functions., , , and . DATE, page 1504-1507. IEEE, (2018)Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions., , , , , and . WWW (Companion Volume), page 217-221. ACM / IW3C2, (2020)PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs., , , , , , and . IACR Cryptology ePrint Archive, (2017)Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange., , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)A PUF-Based Secure Communication Protocol for IoT., , and . ACM Trans. Embed. Comput. Syst., 16 (3): 67:1-67:25 (2017)Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV., and . SPACE, volume 13162 of Lecture Notes in Computer Science, page 129-147. Springer, (2021)A PUF-based Secure Communication Protocol for IoT., , and . IACR Cryptology ePrint Archive, (2016)Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT., , , and . ACM Trans. Design Autom. Electr. Syst., 25 (4): 32:1-32:21 (2020)Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF., , and . IACR Cryptol. ePrint Arch., (2022)Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs., , and . SPACE, volume 13783 of Lecture Notes in Computer Science, page 204-224. Springer, (2022)