Volgen
Mohammad Nasim Imtiaz Khan
Mohammad Nasim Imtiaz Khan
Geverifieerd e-mailadres voor Intel.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Side-channel attack on STTRAM based cache for cryptographic application
MNI Khan, S Bhasin, A Yuan, A Chattopadhyay, S Ghosh
2017 IEEE International Conference on Computer Design (ICCD), 33-40, 2017
352017
Security and privacy threats to on-chip non-volatile memories and countermeasures
S Ghosh, MNI Khan, A De, JW Jang
2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-6, 2016
312016
Hardware trojans in emerging non-volatile memories
MNI Khan, K Nagarajan, S Ghosh
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 396-401, 2019
272019
Modeling and forecasting the sugarcane yield of Pakistan.
M Yaseen, M Zakria, IDS Islam-ud-Din-Shahzad, MI Khan, MA Javed
262005
ENTT: A family of emerging NVM-based trojan triggers
K Nagarajan, MNI Khan, S Ghosh
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
242019
Fault injection attacks on emerging non-volatile memory and countermeasures
MNI Khan, S Ghosh
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
242018
Analysis of row hammer attack on sttram
MNI Khan, S Ghosh
2018 IEEE 36th International Conference on Computer Design (ICCD), 75-82, 2018
222018
HarTBleed: Using hardware Trojans for data leakage exploits
A De, MNI Khan, K Nagarajan, S Ghosh
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 (4), 968-979, 2020
212020
Cache-out: Leaking cache memory using hardware trojan
MNI Khan, A De, S Ghosh
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 (6 …, 2020
172020
Information leakage attacks on emerging non-volatile memory and countermeasures
MNI Khan, S Ghosh
Proceedings of the International Symposium on Low Power Electronics and …, 2018
172018
Replacing eFlash with STTRAM in IoTs: security challenges and solutions
A De, MNI Khan, J Park, S Ghosh
Journal of Hardware and Systems Security 1, 328-339, 2017
16*2017
Power side channel attack analysis and detection
N Gattu, MNI Khan, A De, S Ghosh
Proceedings of the 39th International Conference on Computer-Aided Design, 1-7, 2020
142020
Novel magnetic burn-in for retention testing of STTRAM
MNI Khan, AS Iyengar, S Ghosh
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017
142017
Comprehensive study of security and privacy of emerging non-volatile memories
MNI Khan, S Ghosh
Journal of low power electronics and applications 11 (4), 36, 2021
132021
Nanotechnology-based approaches and investigational therapeutics against COVID-19
MM Rahman, M Ahmed, MT Islam, MR Khan, S Sultana, SK Maeesa, ...
Current Pharmaceutical Design 28 (12), 948-968, 2022
122022
Managing Data Protection and Cybersecurity-Audit's Role
M Khan
ISACA Journal 1 (2016), 2016
122016
SHINE: A novel SHA-3 implementation using ReRAM-based in-memory computing
K Nagarajan, SS Ensan, MNI Khan, S Ghosh, A Chattopadhyay
2019 IEEE/ACM International Symposium on Low Power Electronics and Design …, 2019
112019
A low cost optical sensor based heart rate monitoring system
MNI Khan, DF Noor, MJH Pantho, TS Abtahi, F Parveen, MIH Bhuiyan
2013 International Conference on Informatics, Electronics and Vision (ICIEV …, 2013
112013
Willingness to pay for adopting conservation tillage technologies in wheat cultivation: policy options for small-scale farmers
SB Nazu, SM Saha, ME Hossain, S Haque, MA Khan
Environmental Science and Pollution Research 29 (42), 63458-63471, 2022
102022
SCARE: Side channel attack on in-memory computing for reverse engineering
SS Ensan, K Nagarajan, MNI Khan, S Ghosh
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29 (12 …, 2021
102021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20