Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Low-Cost GPS Spoofing Detector Design for Internet of Things (IoT) Applications., , and . ACM Great Lakes Symposium on VLSI, page 161-166. ACM, (2017)Voltage Over-Scaling-Based Lightweight Authentication for IoT Security., , , , and . IEEE Trans. Computers, 71 (2): 323-336 (2022)Memristors for Secret Sharing-Based Lightweight Authentication., and . IEEE Trans. VLSI Syst., 26 (12): 2671-2683 (2018)Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks., , , and . AsianHOST, page 7-12. IEEE, (2018)Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version)., , , and . CoRR, (2018)Hardware-Based Authentication for the Internet of Things.. University of Maryland, College Park, MD, USA, (2018)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/20962).RRAM Based Lightweight User Authentication., and . ICCAD, page 139-145. IEEE, (2015)A survey on memristor modeling and security applications., , , , and . ISQED, page 440-447. IEEE, (2015)LPN-based Device Authentication Using Resistive Memory., , , and . ACM Great Lakes Symposium on VLSI, page 9-14. ACM, (2019)Secret Sharing and Multi-user Authentication: From Visual Cryptography to RRAM Circuits., and . ACM Great Lakes Symposium on VLSI, page 169-174. ACM, (2016)