Author of the publication

A Primer on Hardware Security: Models, Methods, and Metrics.

, , and . Proceedings of the IEEE, 102 (8): 1283-1295 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Karri, Ramesh
add a person with the name Karri, Ramesh
 

Other publications of authors with the same name

Computer Aided Design of Fault-Tolerant Application Specific Programmable Processors., , and . IEEE Trans. Computers, 49 (11): 1272-1284 (2000)Divide-and-concatenate: an architecture-level optimization technique for universal hash functions., , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 24 (11): 1740-1747 (2005)Micropreemption synthesis: an enabling mechanism for multitask VLSI systems., , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 25 (1): 19-30 (2006)Toward Future Systems with Nanoscale Devices: Overcoming the Reliability Challenge., , , and . IEEE Computer, 44 (2): 46-53 (2011)Blue team red team approach to hardware trust assessment., , and . ICCD, page 285-288. IEEE Computer Society, (2011)Architectural-Level Fault Tolerant Computation in Nanoelectronic Processors., , and . ICCD, page 533-542. IEEE Computer Society, (2005)Deep Packet Field Extraction Engine (DPFEE): A pre-processor for network intrusion detection and denial-of-service detection systems., , and . ICCD, page 266-272. IEEE Computer Society, (2015)Minimizing energy consumption of secure wireless session with QoS constraints., and . ICC, page 2053-2057. IEEE, (2002)Fault Tolerant Arithmetic with Applications in Nanotechnology based Systems., , and . ITC, page 472-478. IEEE Computer Society, (2004)Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits., and . IEEE Trans. on CAD of Integrated Circuits and Systems, 35 (3): 485-498 (2016)