Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks., , and . ICISTM, volume 285 of Communications in Computer and Information Science, page 372-383. Springer, (2012)An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration., , and . ICISTM, volume 285 of Communications in Computer and Information Science, page 325-335. Springer, (2012)A Systems Approach to Cyber Assurance Education., and . InfoSecCD, page 13-19. ACM, (2013)Formal Security Evaluation of Ad Hoc Routing Protocols. Florida State University, (2007)SCADA Trust Management System., , , , and . Security and Management, page 548-554. CSREA Press, (2010)On the Credibility of Manet Simulations., and . Computer, 39 (7): 48-54 (2006)Software Security and Randomization through Program Partitioning and Circuit Variation., , and . MTD@CCS, page 79-86. ACM, (2014)Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols., and . STM@ESORICS, volume 197 of Electronic Notes in Theoretical Computer Science, page 3-14. Elsevier, (2007)Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks., , , and . IPCCC, page 469-474. IEEE Computer Society, (2008)Enhanced Operating System Protection to Support Digital Forensic Investigations., , , , and . TrustCom/BigDataSE/ICESS, page 650-659. IEEE Computer Society, (2017)