Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications., and . IEEE Des. Test, 34 (4): 26-33 (2017)Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design., , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 79-93 (2018)Functional encryption of integrated circuits by key-based hybrid obfuscation., , and . ACSSC, page 484-488. IEEE, (2017)Incremental-Precision Based Feature Computation and Multi-Level Classification for Low-Energy Internet-of-Things., and . IEEE J. Emerg. Sel. Topics Circuits Syst., 8 (4): 822-835 (2018)Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure., , , , , and . J. Hardw. Syst. Secur., 4 (4): 343-360 (2020)Security Risk Assessment of Server Hardware Architectures Using Graph Analysis.. AsianHOST, page 1-4. IEEE, (2021)AccShield: a New Trusted Execution Environment with Machine-Learning Accelerators., , , , , and . DAC, page 1-6. IEEE, (2023)Low-Energy Architectures of Linear Classifiers for IoT Applications using Incremental Precision and Multi-Level Classification., and . ACM Great Lakes Symposium on VLSI, page 291-296. ACM, (2018)Mode-based Obfuscation using Control-Flow Modifications., , and . CS2@HiPEAC, page 19-24. ACM, (2016)ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch., , , , and . SPACE, volume 11947 of Lecture Notes in Computer Science, page 159-175. Springer, (2019)