Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenging the security of Ä PUF-based hardware mutual authentication protocol"., , , and . J. Parallel Distributed Comput., (2022)On the Entropy of Oscillator-Based True Random Number Generators under Ionizing Radiation., , , , and . Entropy, 20 (7): 513 (2018)Unveiling Hidden Patterns: Harnessing the Power of Short PPG-Traces for Atrial Fibrillation Detection., , , and . BSN, page 1-4. IEEE, (2023)Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness., , , and . IEEE Trans. Inf. Forensics Secur., 10 (2): 266-277 (2015)Using Approximate Circuits Against Hardware Trojans., , , and . IEEE Des. Test, 40 (3): 8-16 (June 2023)ECG-RNG: A Random Number Generator Based on ECG Signals and Suitable for Securing Wireless Sensor Networks., , , and . Sensors, 18 (9): 2747 (2018)Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange., , , and . IEEE Access, (2020)A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation., , , and . IOLTS, page 41-42. IEEE, (2018)AKARI-X: A pseudorandom number generator for secure lightweight systems., , , , and . IOLTS, page 228-233. IEEE Computer Society, (2011)A True Random Number Generator Based on Gait Data for the Internet of You., , , and . IEEE Access, (2020)