Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IBC-EI: An Instruction Based Compression method with Encryption and Integrity Checking., , , , , , and . ReCoSoC, page 138-145. Univ. Montpellier II, (2007)Asymmetric Cache Coherency: Policy Modifications to Improve Multicore Performance., , and . ACM Trans. Reconfigurable Technol. Syst., 5 (3): 12:1-12:12 (2012)WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks., , , , , , and . IEEE Access, (2020)Closed-loop-based self-adaptive Hardware/Software-Embedded systems: Design methodology and smart cam case study., , and . ACM Trans. Embed. Comput. Syst., 10 (3): 38:1-38:28 (2011)Protecting Behavioral IPs During Design Time: Key-Based Obfuscation Techniques for HLS in the Cloud., , , and . Behavioral Synthesis for Hardware Security, (2022)Dynamic NoC-based architecture for MPSoC security implementation., , , , and . SBCCI, page 197-202. ACM, (2011)IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction., , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 32-45. Springer, (2020)Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm., , , , , and . GIIS, page 1-5. IEEE, (2018)3D-LeukoNoC: A dynamic NoC protection., , , , , and . ReConFig, page 1-6. IEEE, (2014)A small and adaptive coprocessor for information flow tracking in ARM SoCs., , , , , , and . ReConFig, page 1-8. IEEE, (2018)