Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trustworthy Hardware Scanning the Issue., and . Proceedings of the IEEE, 102 (8): 1123-1125 (2014)Physical Unclonable Functions and Applications: A Tutorial., , , and . Proceedings of the IEEE, 102 (8): 1126-1141 (2014)Evolving EDA Beyond its E-Roots: An Overview., and . ICCAD, page 247-254. IEEE, (2015)High-sensitivity hardware trojan detection using multimodal characterization., , , and . DATE, page 1271-1276. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions., , and . INFOCOM, IEEE, (2006)System-Architectures for Sensor Networks Issues, Alternatives, and Directions., , and . ICCD, page 226-. IEEE Computer Society, (2002)Automated checkpointing for enabling intensive applications on energy harvesting devices., , and . ISLPED, page 27-32. IEEE, (2013)Processor-Based Strong Physical Unclonable Functions With Aging-Based Response Tuning., and . IEEE Trans. Emerging Topics Comput., 2 (1): 16-29 (2014)Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching., , , , and . IEEE Trans. Emerging Topics Comput., 2 (1): 37-49 (2014)A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection., and . IEEE Trans. Information Forensics and Security, 6 (1): 162-174 (2011)