Author of the publication

Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain.

, , , , and . SecureComm (2), volume 255 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 43-62. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting., , , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 284-299. (2016)An Input Buffer with 85dB SFDR for High-Speed Pipeline ADC., , , , , and . ICTA, page 52-53. IEEE, (2022)A Residue Amplifier with 85 dB DC Gain and 15 GHz Closed-Loop Bandwidth for 14-Bit 3GSPS Pipeline ADC., , , , , and . Circuits Syst. Signal Process., 41 (12): 6694-6708 (2022)DAda-NC: A Decoupled Adaptive Online Training Algorithm for Deep Learning Under Non-convex Conditions., , , , , , and . ICCSIP, volume 1515 of Communications in Computer and Information Science, page 76-88. Springer, (2021)Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting., , , and . Trustcom/BigDataSE/ISPA, page 292-300. IEEE, (2016)Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain., , , , and . SecureComm (2), volume 255 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 43-62. Springer, (2018)Extracting Robust Keys from NAND Flash Physical Unclonable Functions., , , , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 437-454. Springer, (2015)A Scalable 3D Array Architecture for Accelerating Convolutional Neural Networks., , , , , , , and . ICCSIP, volume 1515 of Communications in Computer and Information Science, page 89-102. Springer, (2021)Chord: Thwarting Relay Attacks Among Near Field Communications., , , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 329-348. Springer, (2018)Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication., , , , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 346-355. Springer, (2015)