From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design of Cam-E-leon, a Run-Time Reconfigurable Web Camera., , , , , , , , , и . Embedded Processor Design Challenges, том 2268 из Lecture Notes in Computer Science, стр. 274-290. Springer, (2002)Differential Power Analysis of MAC-Keccak at Any Key-Length., и . IWSEC, том 8231 из Lecture Notes in Computer Science, стр. 68-82. Springer, (2013)Offline Hardware/Software Authentication for Reconfigurable Platforms., и . CHES, том 4249 из Lecture Notes in Computer Science, стр. 311-323. Springer, (2006)Building a Virtual Framework for Networked Reconfigurable Hardware and Software Objects., , , , и . PDPTA, CSREA Press, (2000)Threat Modeling and Risk Analysis for Miniaturized Wireless Biomedical Devices., , , и . IEEE Internet Things J., 9 (15): 13338-13352 (2022)Synthesis of multi-rate and variable rate circuits for high speed telecommunications applications., , , , и . ED&TC, стр. 542-546. IEEE Computer Society, (1997)Exploiting Security Vulnerabilities in Intermittent Computing., и . SPACE, том 11348 из Lecture Notes in Computer Science, стр. 104-124. Springer, (2018)Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA., , , , , , , , , и 3 other автор(ы). DATE, стр. 508-513. IEEE, (2020)Design methods for security and trust., и . DATE, стр. 672-677. EDA Consortium, San Jose, CA, USA, (2007)Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects., , и . ISA, том 5576 из Lecture Notes in Computer Science, стр. 327-336. Springer, (2009)