Author of the publication

An Effective and Sensitive Scan Segmentation Technique for Detecting Hardware Trojan.

, , and . IEICE Trans. Inf. Syst., 100-D (1): 130-139 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eventually Consistent Distributed Ledger Relying on Degraded Atomic Broadcast., , and . CANDAR Workshops, page 195-200. IEEE, (2019)An integrated DFT solution for power reduction in scan test applications by low power gating scan cell., , , , and . Integr., (2017)Test Pattern Ordering and Selection for High Quality Test Set under Constraints., , , and . IEICE Trans. Inf. Syst., 95-D (12): 3001-3009 (2012)SelfStabilizing WaitFree Clock Synchronization with Bounded Space., , , and . OPODIS, page 129-144. Hermes, (1998)A layout adjustment problem for disjoint rectangles preserving orthogonal order., , , and . Syst. Comput. Jpn., 33 (2): 31-42 (2002)Gathering of Mobile Agents in Asynchronous Byzantine Environments with Authenticated Whiteboards., , and . NETYS, volume 11028 of Lecture Notes in Computer Science, page 85-99. Springer, (2018)Byzantine Gathering in Networks with Authenticated Whiteboards., , and . WALCOM, volume 10167 of Lecture Notes in Computer Science, page 106-118. Springer, (2017)Body-Part Attention Probability for Measuring Gaze During Impression Word Evaluation., , , and . HCI (38), volume 1420 of Communications in Computer and Information Science, page 105-112. Springer, (2021)Brief Announcement: Gathering Despite a Linear Number of Weakly Byzantine Agents., , , and . PODC, page 375-377. ACM, (2022)Decimal Multiplication Using Combination of Software and Hardware., , and . APCCAS, page 239-242. IEEE, (2018)