Author of the publication

Techniques for intellectual property protection of DSP designs.

, and . ICASSP, page 3133-3136. IEEE, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduling Algorithms For Hierarchical Data Control Flow Graphs., and . I. J. Circuit Theory and Applications, 20 (3): 217-233 (1992)Scalable consistency-based hardware trojan detection and diagnosis., and . NSS, page 176-183. IEEE, (2011)Toward energy-efficient and distributed mobile health monitoring using parallel offloading., and . EMBC, page 7257-7261. IEEE, (2013)The bidirectional polyomino partitioned PPUF as a hardware security primitive., and . GlobalSIP, page 257-260. IEEE, (2013)Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels., , , and . DAC, page 90:1-90:6. ACM, (2014)Hardware obfuscation using PUF-based logic., and . ICCAD, page 270-277. IEEE, (2014)Improving the observability and controllability of datapaths foremulation-based debugging., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 18 (11): 1529-1541 (1999)Optimizing resource utilization using transformations., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 13 (3): 277-292 (1994)Optimizing power using transformations., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 14 (1): 12-31 (1995)Algorithm selection: a quantitative optimization-intensive approach., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 18 (5): 524-532 (1999)