Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power-Noise Trade-Offs in Continuous-Time Pipelined ADCs and Active Filters., and . IEEE Trans. Circuits Syst. I Regul. Pap., 70 (10): 3832-3842 (October 2023)Accelerated Verifiable Fair Digital Exchange., , , , , , and . Distributed Ledger Technol. Res. Pract., 2 (3): 1-24 (September 2023)Towards Secure Decoy Routing by Using SDN., and . Tiny Trans. Comput. Sci., (2016)Analysis of Flash ADC Loading on the Performance of a Continuous-Time Pipelined ADC., , and . ISCAS, page 2792-2796. IEEE, (2022)Verifiable and Auditable Digital Interchange Framework., , , , , and . CoRR, (2020)SiegeBreaker: An SDN Based Practical Decoy Routing System., , , , , , , and . Proc. Priv. Enhancing Technol., 2020 (3): 243-263 (2020)Towards a Hybrid Public Key Infrastructure (PKI): A Review., , , and . IACR Cryptology ePrint Archive, (2019)2D Linear Detector Based on Generalized Belief Propagation Algorithm., and . Allerton, page 981-988. IEEE, (2018)Multi-biometric system using Fuzzy Vault., , , , , and . EIT, page 122-126. IEEE, (2016)Target design and low complexity signal detection for two-dimensional magnetic recording., and . APSIPA, page 1-10. IEEE, (2014)