From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dual-Residue Montgomery Multiplication., , и . NPC, том 4672 из Lecture Notes in Computer Science, стр. 267-276. Springer, (2007)RTSEC: Automated RTL Code Augmentation for Hardware Security Enhancement., , , , и . DATE, стр. 596-599. IEEE, (2022)Emerging Technology-Based Design of Primitives for Hardware Security., , , , , , , , и . ACM J. Emerg. Technol. Comput. Syst., 13 (1): 3:1-3:19 (2016)The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction., , и . IEEE Des. Test, 33 (2): 76-96 (2016)Towards scalable, secure, and smart mission-critical IoT systems: review and vision., , , , , , и . EMSOFT, стр. 1-10. ACM, (2021)THE-V: Verifiable Privacy-Preserving Neural Network via Trusted Homomorphic Execution., , , , и . ICCAD, стр. 1-9. IEEE, (2023)Security for safety: a path toward building trusted autonomous vehicles., , , , и . ICCAD, стр. 92. ACM, (2018)Protecting Platoons from Stealthy Jamming Attack., , , и . AsianHOST, стр. 1-6. IEEE, (2020)CAD4EM-P: Security-Driven Placement Tools for Electromagnetic Side Channel Protection., , , , и . AsianHOST, стр. 1-6. IEEE, (2019)Exploitations of wireless interfaces via network scanning., , и . ICNC, стр. 937-941. IEEE Computer Society, (2017)