Author of the publication

On-Chip Impulse Response Generation for Analog and Mixed-Signal Testing.

, , and . ITC, page 262-270. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defect detection under Realistic Leakage Models using Multiple IDDQ Measurement., , and . ITC, page 319-328. IEEE Computer Society, (2004)A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time., , and . IEEE Trans. VLSI Syst., 20 (1): 112-125 (2012)An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities., , , and . IEEE Trans. Information Forensics and Security, 6 (3-2): 1170-1179 (2011)IP-level implementation of a resistance-based physical unclonable function., and . HOST, page 64-69. IEEE Computer Society, (2014)Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution., , , , , , and . IEEE Design & Test, 30 (3): 6-17 (2013)On detecting delay anomalies introduced by hardware trojans., , , , and . ICCAD, page 44. ACM, (2016)Cyber-physical systems: A security perspective., , , , , and . ETS, page 1-8. IEEE, (2015)Information Leakage Analysis Using a Co-Design-Based Fault Injection Technique on a RISC-V Microprocessor., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (3): 438-451 (2022)Securing Scan Design Using Lock and Key Technique., , , and . DFT, page 51-62. IEEE Computer Society, (2005)Securing Trusted Execution Environments with PUF Generated Secret Keys., and . TrustCom, page 1188-1193. IEEE Computer Society, (2012)