Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis., , , , , , , and . IEEE Trans. Computers, 62 (11): 2183-2195 (2013)Interactive presentation: A new asymmetric SRAM cell to reduce soft errors and leakage power in FPGA., , and . DATE, page 1460-1465. EDA Consortium, San Jose, CA, USA, (2007)Process reliability based trojans through NBTI and HCI effects., , , , , and . AHS, page 215-222. IEEE Computer Society, (2010)An efficient elliptic curve cryptography processor using addition chains with high information entropy., , and . CCECE, page 1-6. IEEE, (2012)FPGA-based Design of a Large Moduli Multiplier for Public Key Cryptographic Systems., , , and . ICCD, page 314-319. IEEE, (2006)A supply-demand model based scalable energy management system for improved energy utilization efficiency., , , , , and . Green Computing Conference, page 97-105. IEEE Computer Society, (2010)Trustworthy computing in a multi-core system using distributed scheduling., , , and . IOLTS, page 211-213. IEEE Computer Society, (2010)An Embedded Flash Memory Vault for Software Trojan Protection., and . HOST, page 97-99. IEEE Computer Society, (2008)Cross-correlation of specification and RTL for soft IP analysis., , , , , and . DATE, page 1-6. European Design and Automation Association, (2014)An experiment with WWW interactive learning in university education., and . Comput. Educ., 31 (3): 255-264 (1998)