Most Popular Books
- Physically Unclonable Functions: From Basic Design Principles to Advanced Hardware Security Applications
- Hardware Supply Chain Security: Threat Modelling, Emerging Attacks and Countermeasures
- Authentication of Embedded Devices: Technologies, Protocols and Emerging Applications
- Machine Learning for Embedded System Security
- Algorithms and VLSI Implementations of MIMO Detection





