Author of the publication

Collusion-resistant PUF-based Distributed Device Authentication Protocol for Internet of Things.

, , , and . GLOBECOM, page 4328-4333. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks., , , , and . ICICDT, page 10-15. IEEE, (2023)Impact of Aging on Template Attacks., , and . ACM Great Lakes Symposium on VLSI, page 455-458. ACM, (2018)Special Session: On the Reliability of Conventional and Quantum Neural Network Hardware., , , , , , , and . VTS, page 1-12. IEEE, (2022)Welcome Message from the Chairs., , , , , , , and . COINS, page 1. IEEE, (2023)DELFINES: Detecting Laser Fault Injection Attacks via Digital Sensors., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (3): 774-787 (March 2024)On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis., , , , , and . SECRYPT, page 661-668. SCITEPRESS, (2022)Impact of the switching activity on the aging of delay-PUFs., , , and . ETS, page 1-2. IEEE, (2017)LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection., , , , , and . ISQED, page 40-45. IEEE, (2020)Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks., , , , and . DATE, page 1000-1005. IEEE, (2021)Reliable NoC architecture utilizing a robust rerouting algorithm., , , , and . EWDTS, page 200-203. IEEE Computer Society, (2008)