From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementation-Based Design Fingerprinting for Robust IC Fraud Detection., , , и . J. Hardw. Syst. Secur., 3 (4): 426-439 (2019)Customer Empowered Privacy-Preserving Secure Verification using Decentralized Identifier and Verifiable Credentials For Product Delivery Using Robots.. CoRR, (2022)Design Considerations and Architecture for a Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework., , и . CoRR, (2022)IoT privacy preservation using blockchain.. Inf. Secur. J. A Glob. Perspect., 31 (5): 566-581 (2022)CARE: Lightweight Attack Resilient Secure Boot Architecture with Onboard Recovery for RISC-V based SOC., , и . ISQED, стр. 516-521. IEEE, (2021)Power supply transient signal integration circuit., , и . ITC, стр. 704-712. IEEE Computer Society, (2001)Defect detection under Realistic Leakage Models using Multiple IDDQ Measurement., , и . ITC, стр. 319-328. IEEE Computer Society, (2004)Scalability study of PSANDE: Power supply analysis for noise and delay estimation., , , , и . VTS, стр. 1-6. IEEE Computer Society, (2015)America Walks, a Cross-platform Mobile ResearchKit Study of Walking Behavior Based on Passive Step Tracking., , , , , , и . AMIA, AMIA, (2017)LDA-2IoT : A Level Dependent Authentication using Two Factor for IoT Paradigm., и . CoRR, (2022)