Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive presentation: A new asymmetric SRAM cell to reduce soft errors and leakage power in FPGA., , and . DATE, page 1460-1465. EDA Consortium, San Jose, CA, USA, (2007)An efficient elliptic curve cryptography processor using addition chains with high information entropy., , and . CCECE, page 1-6. IEEE, (2012)Process reliability based trojans through NBTI and HCI effects., , , , , and . AHS, page 215-222. IEEE Computer Society, (2010)Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis., , , , , , , and . IEEE Trans. Computers, 62 (11): 2183-2195 (2013)A supply-demand model based scalable energy management system for improved energy utilization efficiency., , , , , and . Green Computing Conference, page 97-105. IEEE Computer Society, (2010)Trustworthy computing in a multi-core system using distributed scheduling., , , and . IOLTS, page 211-213. IEEE Computer Society, (2010)FPGA-based Design of a Large Moduli Multiplier for Public Key Cryptographic Systems., , , and . ICCD, page 314-319. IEEE, (2006)An Embedded Flash Memory Vault for Software Trojan Protection., and . HOST, page 97-99. IEEE Computer Society, (2008)Smoothing delay jitter in networked control systems., , , and . J. Embed. Comput., 4 (1): 11-21 (2011)A Self Test Program Design Technique for Embedded DSP Cores., , and . J. Electron. Test., 22 (1): 71-87 (2006)