Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure intra-vehicular communication over CANFD., , , , and . AsianHOST, page 97-102. IEEE Computer Society, (2017)Delay model and machine learning exploration of a hardware-embedded delay PUF., , , and . HOST, page 153-158. IEEE Computer Society, (2018)A novel offset method for improving bitstring quality of a Hardware-Embedded delay PUF., , and . HOST, page 157. IEEE Computer Society, (2017)FPGA IP protection by binding Finite State Machine to Physical Unclonable Function., , , , , , , and . FPL, page 1-4. IEEE, (2013)A Lightweight Neighbor-Averaging Technique for Reducing Systematic Variations in Physically Unclonable Functions., , and . ISQED, page 1-6. IEEE, (2022)Novel Offset Techniques for Improving Bitstring Quality of a Hardware-Embedded Delay PUF., , and . IEEE Trans. Very Large Scale Integr. Syst., 26 (4): 733-743 (2018)Self-authenticating secure boot for FPGAs., , , , and . HOST, page 221-226. IEEE Computer Society, (2018)Tampering Attack Detection in Analog to Feature Converter for Wearable Biosensor., , , and . ISCAS, page 1150-1154. IEEE, (2022)Binding Hardware IPs to Specific FPGA Device via Inter-twining the PUF Response with the FSM of Sequential Circuits., , , , , , and . FCCM, page 227. IEEE Computer Society, (2013)PUF-Based Authentication., , and . ICCAD, page 337-344. IEEE, (2015)