Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Things security: Are we paranoid enough?. ICCE, page 1. IEEE, (2018)ENFIRE: An Energy-efficient Fine-grained Spatio-temporal Reconfigurable Computing Fabric (Abstact Only)., , , and . FPGA, page 275. ACM, (2016)Ultralow power computing with sub-threshold leakage: a comparative study of bulk and SOI technologies., , , and . DATE, page 856-861. European Design and Automation Association, Leuven, Belgium, (2006)Sequential hardware Trojan: Side-channel aware design and placement., , , , and . ICCD, page 297-300. IEEE Computer Society, (2011)Energy-efficient reconfigurable computing using Spintronic memory., , and . MWSCAS, page 1-4. IEEE, (2015)Intrinsic and Database-free Watermarking in ICs by Exploiting Process and Design Dependent Variability in Metal-Oxide-Metal Capacitances., , and . ISLPED, page 44:1-44:6. ACM, (2018)Runtime Integrity Verification in Cyber-physical Systems using Side-Channel Fingerprint., , , and . ICCE, page 1-6. IEEE, (2019)Hardware Trojan attacks in embedded memory., , , , and . VTS, page 1-6. IEEE Computer Society, (2018)Memory-based computing for performance and energy improvement in multicore architectures., , and . ACM Great Lakes Symposium on VLSI, page 287-290. ACM, (2012)Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures., , , and . ACM Great Lakes Symposium on VLSI, page 287-292. ACM, (2014)