Author of the publication

A Distributed Reconfiguration Controller for Linear Array Harvest Problem: Hierarchically Quasi-Normalized Neural Approach.

, , and . ISCAS, page 67-70. IEEE, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sutikno, Sarwono
add a person with the name Sutikno, Sarwono
 

Other publications of authors with the same name

General Model for Secure Electronic Cash Scheme., , and . Int. J. Netw. Secur., 21 (3): 501-510 (2019)Detecting Unknown Hardware Trojans in Register Transfer Level Leveraging Verilog Conditional Branching Features., , , and . IEEE Access, (2023)Trust-Hub Trojan Benchmark for Hardware Trojan Detection Model Creation using Machine Learning., , , and . (September 2022)Attacking AES-Masking Encryption Device with Correlation Power Analysis., , , and . Int. J. Commun. Networks Inf. Secur., (2018)A Distributed Reconfiguration Controller for Linear Array Harvest Problem: Hierarchically Quasi-Normalized Neural Approach., , and . ISCAS, page 67-70. IEEE, (1994)The New Embedded System Design Methodology For Improving Design Process Performance, , , and . CoRR, (2010)Design of an AES Device as Device Under Test in a DPA Attack., , , , and . Int. J. Netw. Secur., 20 (2): 256-265 (2018)An architecture of F(22N) multiplier for elliptic curves cryptosystem., and . ISCAS, page 279-282. IEEE, (2000)VHDL design and simulation of MAM memory for LAPCAM parallel architecture for image processing., , , , and . APCCAS (1), page 389-392. IEEE, (2002)The New Block Cipher: BC2., , , , and . Int. J. Netw. Secur., 8 (1): 16-24 (2009)