Nath Chowdhury, Sreeja
28  Ergebnisse:
Personensuche X
?
3

Carbon nanotubes and carbon nanofibers based co-continuous ..:

Ghosh, Suman Kumar ; Das, Tushar Kanti ; Ganguly, Sayan...
Composites Part A: Applied Science and Manufacturing.  161 (2022)  - p. 107118 , 2022
 
?
4

Design of interconnected 1D nanomaterials with selective lo..:

Nath, Krishnendu ; Ghosh, Suman Kumar ; Katheria, Ankur...
Polymers for Advanced Technologies.  34 (2022)  3 - p. 1019-1034 , 2022
 
?
5

Combination effect of functionalized high aspect ratio carb..:

Suman Kumar Ghosh ; Krishnendu Nath ; Sreeja Nath Chowdhury...
http://www.sciencedirect.com/science/article/pii/S2666821123000625.  , 2023
 
?
6

Photon Emission Modeling and Machine-Learning Assisted Pre-..:

, In: 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
Li, Henian ; Lin, Lang ; Chang, Norman... - p. 107-111 , 2024
 
?
7

Silicon-correlated Simulation Methodology of EM Side-channe..:

Monta, Kazuki ; Lin, Lang ; Wen, Jimin...
ACM Journal on Emerging Technologies in Computing Systems.  19 (2022)  1 - p. 1-23 , 2022
 
?
8

Layout-level Vulnerability Ranking from Electromagnetic Fau..:

, In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
Lin, Lang ; Wen, Jimin ; Shrivastav, Harsh... - p. 17-20 , 2022
 
?
9

Physical security in the post-quantum era: A survey on side..:

Chowdhury, Sreeja ; Covic, Ana ; Acharya, Rabin Yu...
Journal of Cryptographic Engineering.  12 (2021)  3 - p. 267-303 , 2021
 
?
 
?
11

Permutation Network De-obfuscation : A Delay-based Attac..:

Guo, Zimu ; Chowdhury, Sreeja ; Tehranipoor, Mark M..
ACM Journal on Emerging Technologies in Computing Systems (JETC).  16 (2020)  2 - p. 1-25 , 2020
 
?
12

Permutation Network De-obfuscation: A Delay-based Attack an..:

Guo, Zimu ; Chowdhury, Sreeja ; Tehranipoor, Mark M..
ACM Journal on Emerging Technologies in Computing Systems.  16 (2020)  2 - p. 1-25 , 2020
 
?
13

Attack of the Genes: Finding Keys and Parameters of Locked ..:

, In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
 
?
 
1-15