From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Internet of Things security: Are we paranoid enough?. ICCE, стр. 1. IEEE, (2018)ENFIRE: An Energy-efficient Fine-grained Spatio-temporal Reconfigurable Computing Fabric (Abstact Only)., , , и . FPGA, стр. 275. ACM, (2016)Ultralow power computing with sub-threshold leakage: a comparative study of bulk and SOI technologies., , , и . DATE, стр. 856-861. European Design and Automation Association, Leuven, Belgium, (2006)VL-ECC: Variable Data-Length Error Correction Code for Embedded Memory in DSP Applications., , и . IEEE Trans. Circuits Syst. II Express Briefs, 61-II (2): 120-124 (2014)Secure and Trusted SoC: Challenges and Emerging Solutions., , и . MTV, стр. 29-34. IEEE Computer Society, (2013)Micropipeline-Based Asynchronous Design Methodology for Robust System Design Using Nanoscale Crossbar., и . ISQED, стр. 697-701. IEEE Computer Society, (2008)A Power-Aware GALS Architecture for Real-Time Algorithm-Specific Tasks., , , и . ISQED, стр. 358-363. IEEE Computer Society, (2005)Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP., и . HOST, стр. 96-99. IEEE Computer Society, (2009)Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach., , , , , , , и . HOST, стр. 13-18. IEEE Computer Society, (2010)SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware., , , , , и . DATE, стр. 310-313. IEEE, (2020)