From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unlock Your Heart: Next Generation Biometric in Resource-Constrained Healthcare Systems and IoT., , , и . IEEE Access, (2019)EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration., и . J. Hardw. Syst. Secur., 7 (4): 147-164 (декабря 2023)A Metal-Via Resistance Based Physically Unclonable Function With Backend Incremental ADC., , , и . IEEE Trans. Circuits Syst. I Regul. Pap., 68 (11): 4700-4709 (2021)Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives., , , , , , , , , и . CoRR, (2020)Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions., , и . IACR Cryptol. ePrint Arch., (2023)Upgrade/Downgrade: Efficient and Secure Legacy Electronic System Replacement., , и . IEEE Des. Test, 36 (1): 14-22 (2019)A Brief Tutorial on Mixed Signal Approaches to Combat Electronic Counterfeiting., , , , и . IEEE Open J. Circuits Syst., (2023)Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems., , , , и . DATE, стр. 514-519. IEEE, (2020)Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones., , , , , и . PROOFS, том 11 из Kalpa Publications in Computing, стр. 33-48. EasyChair, (2019)ASHES '23: Workshop on Attacks and Solutions in Hardware Security., , , и . CCS, стр. 3664-3665. ACM, (2023)