113 results on '"Chandy, John A."'
Search Results
2. A framework for evaluating security risk in system design
3. Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards
4. Elevated Plasma Soluble ST2 Levels are Associated With Neuronal Injury and Neurocognitive Impairment in Children With Cerebral Malaria
5. Framework for Design Exploration of Secure Embedded System Development
6. Influence of Error on Hamming Weights for ASCA
7. Error Tolerant ASCA on FPGA
8. Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards
9. Single low-dose primaquine for blocking transmission of Plasmodium falciparum malaria – a proposed model-derived age-based regimen for sub-Saharan Africa
10. Sero-catalytic and Antibody Acquisition Models to Estimate Differing Malaria Transmission Intensities in Western Kenya
11. Compute-in-Memory SRAM Cell Using Multistate Spatial Wavefunction Switched (SWS)-Quantum Dot Channel (QDC) FET
12. Low Pass Filter PUF: Authentication of Printed Circuit Boards Based on Resistor and Capacitor Variations
13. Multi-State 2-Bit CMOS Logic Using n- and p-Quantum Well Channel Spatial Wavefunction Switched (SWS) FETs
14. An Overview of DRAM-Based Security Primitives
15. Quantum Dot Floating Gate Nonvolatile Random Access Memory Using Ge Quantum Dot Channel for Faster Erasing
16. Error Tolerant ASCA on FPGA
17. Influence of Error on Hamming Weights for ASCA
18. Exploring Methods of Authentication for the Internet of Things
19. Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk
20. Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk.
21. Economic evaluation of postdischarge malaria chemoprevention in preschool children treated for severe anaemia in Malawi, Kenya, and Uganda: A cost-effectiveness analysis
22. Cache Locking and Encryption to Prevent Memory Snooping in Embedded Systems
23. Extracting Vulnerabilities from GitHub Commits
24. What Can Twins Teach Us About Malaria Epidemiology?
25. Towards the Use of a Smartphone Imaging-Based Tool for Point-of-Care Detection of Asymptomatic Low-Density Malaria Parasitemia
26. Harmful Algal Bloom Interception, Treatment, and Transformation System, 'HABITATS' : pilot research study phase I - summer 2019
27. Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory
28. Integrated Circuit Authentication Based on Resistor and Capacitor Variations of a Low Pass Filter (LoPUF).
29. FLASH: FPGA Locality-Aware Sensitive Hash for Nearest Neighbor Search and Clustering Application
30. A Holistic Approach to Cyber Physical Systems Security and Resilience
31. SMART: security model adversarial risk-based tool for systems security design evaluation
32. Embedded Systems Authentication and Encryption Using Strong PUF Modeling
33. Additional file 1: of Zinc for Infection Prevention in Sickle Cell Anemia (ZIPS): study protocol for a randomized placebo-controlled trial in Ugandan children with sickle cell anemia
34. Anti-Reverse Engineering Techniques for Integrated Circuits and Electronics Hardware
35. Electronics Authentication using a Low Pass Filter PUF
36. Key Generation for Hardware Obfuscation Using Strong PUFs
37. HOTMeTaL
38. Eight‐bit ADC using non‐volatile flash memory
39. P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices
40. Low Pass Filter PUF: Authentication of Printed Circuit Boards Based on Resistor and Capacitor Variations
41. Multi-State 2-Bit CMOS Logic Using n- and p- Quantum Well Channel Spatial Wavefunction Switched (SWS) FETs
42. Phase Calibrated Ring Oscillator PUF Design and Application
43. An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design
44. DVFT: A Lightweight Solution for Power-Supply Noise-Based TRNG Using Dynamic Voltage Feedback Tuning System
45. An Overview of DRAM-Based Security Primitives
46. Low-cost authentication paradigm for consumer electronics within the internet of wearable fitness tracking applications
47. DRAM Remanence Effects based Hardware TRNG
48. Multi-Bit NVRAMs Using Quantum Dot Gate Access Channel
49. Phase calibrated ring oscillator PUF design and implementation on FPGAs
50. PUF-Based Fuzzy Authentication Without Error Correcting Codes
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.