Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel Offset Techniques for Improving Bitstring Quality of a Hardware-Embedded Delay PUF., , and . IEEE Trans. Very Large Scale Integr. Syst., 26 (4): 733-743 (2018)Defect detection under Realistic Leakage Models using Multiple IDDQ Measurement., , and . ITC, page 319-328. IEEE Computer Society, (2004)Self-authenticating secure boot for FPGAs., , , , and . HOST, page 221-226. IEEE Computer Society, (2018)IP-level implementation of a resistance-based physical unclonable function., and . HOST, page 64-69. IEEE Computer Society, (2014)Reinforcement Learning Toward Decision-Making for Multiple Trusted-Third-Parties in PUF-Cash., , , and . WF-IoT, page 1-6. IEEE, (2020)UAV-enabled Human Internet of Things., , , and . DCOSS, page 312-319. IEEE, (2020)Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution., , , , , , and . IEEE Des. Test, 30 (3): 6-17 (2013)On detecting delay anomalies introduced by hardware trojans., , , , and . ICCAD, page 44. ACM, (2016)Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system., , and . DAC, page 240-243. ACM, (2010)Secure Design Flow of FPGA Based RISC-V Implementation., , , , , and . IVSW, page 37-42. IEEE, (2019)