Author of the publication

Guest Editorial Special Section on Hardware Security and Trust.

, , , , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 34 (6): 873-874 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Architecture for Accessing Health Records on Mobile Phones., , , , and . HEALTHINF, page 87-96. SciTePress, (2011)Private Auctions with Multiple Rounds and Multiple Items., , and . DEXA Workshops, page 423-427. IEEE Computer Society, (2002)Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization., , , , , and . IEEE Symposium on Security and Privacy, page 574-588. IEEE Computer Society, (2013)Security & Privacy Week Interviews, Part 1., and . IEEE Security & Privacy, 14 (5): 58-67 (2016)The Cybersecurity Landscape in Industrial Control Systems., , , , , , and . Proceedings of the IEEE, 104 (5): 1039-1057 (2016)Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure., , and . EUSIPCO, page 1-4. IEEE, (2002)Readactor: Practical Code Randomization Resilient to Memory Disclosure., , , , , , , and . IEEE Symposium on Security and Privacy, page 763-780. IEEE Computer Society, (2015)CryptoML: Secure outsourcing of big data machine learning applications., , and . HOST, page 149-154. IEEE Computer Society, (2016)DÏoT: A Federated Self-learning Anomaly Detection System for IoT., , , , , and . ICDCS, page 756-767. IEEE, (2019)TASTY: tool for automating secure two-party computations., , , , and . ACM Conference on Computer and Communications Security, page 451-462. ACM, (2010)