Author of the publication

Hardware Trojan detection acceleration based on word-level statistical properties management.

, and . FPT, page 153-160. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services., , and . SEC, volume 214 of IFIP Conference Proceedings, page 239-250. Kluwer, (2002)Secure M-commerce Transactions: A Third Party Based Signature Protocol., , , and . IAS, page 3-8. IEEE Computer Society, (2007)The War in the Wearable Device Market: the Analysis from Economic Perspective., and . PACIS, page 147. (2014)Sequence Analysis of rDNA ITS of Clinical Fusarium Species., , and . BMEI, page 1-3. IEEE, (2009)A 60GHz power amplifier using 90-nm RF-CMOS technology., , , , , , and . ASICON, page 933-936. IEEE, (2011)Nonholonomic constrained navigation algorithm for MIMU/odometer integration., , , and . ITSC, page 2440-2445. IEEE, (2014)Deficiency in anterior-posterior connectivity of default-mode network in amnestic mild cognitive impairment: A combined task-related and resting-state fMRI study., , , , , , , and . BMEI, page 228-232. IEEE, (2011)Robust local and global shape context for tattoo image matching., , , , and . ICIP, page 2194-2198. IEEE, (2015)Shape matching using a self similar affine invariant descriptor., , , and . ICIP, page 2470-2474. IEEE, (2016)Real-time distributed tracking with non-overlapping cameras., , and . ICIP, page 697-700. IEEE, (2010)