Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Things security: Are we paranoid enough?. ICCE, page 1. IEEE, (2018)ENFIRE: An Energy-efficient Fine-grained Spatio-temporal Reconfigurable Computing Fabric (Abstact Only)., , , and . FPGA, page 275. ACM, (2016)Ultralow power computing with sub-threshold leakage: a comparative study of bulk and SOI technologies., , , and . DATE, page 856-861. European Design and Automation Association, Leuven, Belgium, (2006)VL-ECC: Variable Data-Length Error Correction Code for Embedded Memory in DSP Applications., , and . IEEE Trans. Circuits Syst. II Express Briefs, 61-II (2): 120-124 (2014)Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP., and . HOST, page 96-99. IEEE Computer Society, (2009)Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach., , , , , , , and . HOST, page 13-18. IEEE Computer Society, (2010)Secure and Trusted SoC: Challenges and Emerging Solutions., , and . MTV, page 29-34. IEEE Computer Society, (2013)Hardware Trojan attacks in embedded memory., , , , and . VTS, page 1-6. IEEE Computer Society, (2018)SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware., , , , , and . DATE, page 310-313. IEEE, (2020)An automated configurable Trojan insertion framework for dynamic trust benchmarks., , , and . DATE, page 1598-1603. IEEE, (2018)