Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Future Large-Scale Memristive Device Crossbar Arrays: Limits Imposed by Sneak-Path Currents on Read Operations., , , , and . CoRR, (2015)Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality., , , and . IACR Cryptology ePrint Archive, (2015)Building Secure SRAM PUF Key Generators on Resource Constrained Devices., , , , , and . PerCom Workshops, page 912-917. IEEE, (2019)STRIP: a defence against trojan attacks on deep neural networks., , , , , and . ACSAC, page 113-125. ACM, (2019)A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM., , , , , , , and . CoRR, (2022)NTD: Non-Transferability Enabled Backdoor Detection., , , , , , , , and . CoRR, (2021)SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh., , , , , , , , , and . CoRR, (2021)Lightweight (Reverse) Fuzzy Extractor with Multiple Referenced PUF Responses., , , and . CoRR, (2018)SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices., , , , , and . CoRR, (2018)Efficient Erasable PUFs from Programmable Logic and Memristors., , , , , , , , , and . IACR Cryptology ePrint Archive, (2018)