Author of the publication

A Primer on Hardware Security: Models, Methods, and Metrics.

, , and . Proceedings of the IEEE, 102 (8): 1283-1295 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Rostami, Masoud
add a person with the name Rostami, Masoud
 

Other publications of authors with the same name

Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching., , , , and . IEEE Trans. Emerging Topics Comput., 2 (1): 37-49 (2014)Heart-to-heart (H2H): authentication for implanted medical devices., , and . ACM Conference on Computer and Communications Security, page 1099-1112. ACM, (2013)Quantitative Comparison of Optical and Electrical H, X, and Y clock Distribution Networks., , , and . ISVLSI, page 488-489. IEEE Computer Society, (2007)Novel dual-Vth independent-gate FinFET circuits., and . ASP-DAC, page 867-872. IEEE, (2010)Dual-Vth Independent-Gate FinFETs for Low Power Logic Circuits., and . IEEE Trans. on CAD of Integrated Circuits and Systems, 30 (3): 337-349 (2011)Balancing security and utility in medical devices?, , , and . DAC, page 13:1-13:6. ACM, (2013)Statistical Design Optimization of FinFET SRAM Using Back-Gate Voltage., , , and . IEEE Trans. VLSI Syst., 19 (10): 1911-1916 (2011)A Primer on Hardware Security: Models, Methods, and Metrics., , and . Proceedings of the IEEE, 102 (8): 1283-1295 (2014)Hardware security: threat models and metrics., , , and . ICCAD, page 819-823. IEEE, (2013)Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security., , , and . DATE, page 1-6. European Design and Automation Association, (2014)