Hutto, Kevin
17  results:
Search for persons X
?
1

Experimental System for Supply Chain Cyber-Security of Dist..:

, In: 2024 IEEE Texas Power and Energy Conference (TPEC),
 
?
3

Developing Simulation Capabilities for Supply Chain Cyberse..:

, In: 2023 IEEE PES Innovative Smart Grid Technologies Latin America (ISGT-LA),
Keller, Joseph ; Paul, Shuva ; Hutto, Kevin.. - p. 205-209 , 2023
 
?
4

Late Breaking Results: COPPER: Computation Obfuscation by P..:

, In: 2023 60th ACM/IEEE Design Automation Conference (DAC),
Hutto, Kevin ; Mooney, Vincent - p. 1-2 , 2023
 
?
5

PUF-Based Two-Factor Authentication Protocol for Securing t..:

, In: 2022 IEEE Kansas Power and Energy Conference (KPEC),
Hutto, Kevin ; Paul, Shuva ; Newberg, Benjamin... - p. 1-6 , 2022
 
?
6

Hardware-Based Randomized Encoding for Sensor Authenticatio..:

, In: 2022 IEEE Texas Power and Energy Conference (TPEC),
 
?
7

RanCompute: Computational Security in Embedded Devices via ..:

, In: 2022 11th Mediterranean Conference on Embedded Computing (MECO),
 
?
8

Sensing with Random Encoding for Enhanced Security in Embed..:

, In: 2021 10th Mediterranean Conference on Embedded Computing (MECO),
Hutto, Kevin ; Mooney, Vincent J. - p. 1-6 , 2021
 
?
10

Contributors:

, In: Haschek and Rousseaux's Handbook of Toxicologic Pathology,
Adams, E. Terence ; Adler, Rick ; Alden, Carl L.... - p. xxxiii-xxxvi , 2013
 
?
11

Book Reviews:

Aho, Kevin A. ; Berkowitz, Charlotte ; Burke, Peter...
The European Legacy.  12 (2007)  7 - p. 891-928 , 2007
 
?
 
?
15

Contributors:

, In: Spontaneous Pathology of the Laboratory Non-Human Primate,
Alison, Roger ; Baily, James E. ; Bradley, Alys E.... - p. xvii-xviii , 2023
 
1-15