Author of the publication

Challenges of Securing Low-Power LoRaWAN Devices Deployed in Advanced Manufacturing.

, , , , and . ISQED, page 1. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing FPGA-based obsolete component replacement for legacy systems., , , , and . ISQED, page 401-406. IEEE, (2018)Mitigating Control Flow Attacks in Embedded Systems with Novel Built-in Secure Register Bank., , , and . ACM Great Lakes Symposium on VLSI, page 483-486. ACM, (2017)Exploiting state obfuscation to detect hardware trojans in NoC network interfaces., and . MWSCAS, page 1-4. IEEE, (2015)Transient error management for partially adaptive router in network-on-chip (NoC)., and . ISCAS, page 1672-1675. IEEE, (2012)A hardened network-on-chip design using runtime hardware Trojan mitigation methods., and . Integr., (2017)An Orthogonal Algorithm for Key Management in Hardware Obfuscation., , , , , , and . AsianHOST, page 1-4. IEEE, (2019)Optimal pressure sensor locations in smart insoles for heel-strike and toe-off detection., , , , , and . BioCAS, page 458-461. IEEE, (2022)DPReDO: Dynamic Partial Reconfiguration enabled Design Obfuscation for FPGA Security., , and . SOCC, page 1-6. IEEE, (2022)Invariance Checking Based Trojan Detection Method for Three-Dimensional Integrated Circuits., and . ISCAS, page 1-5. IEEE, (2020)Session details: Session 6A: Special Session -1: Machine Learning and Hardware Attacks.. ACM Great Lakes Symposium on VLSI, ACM, (2022)