default search action
Ali Shuja Siddiqui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j3]Geraldine Shirley Nicholas, Ali Shuja Siddiqui, Sam Reji Joseph, Gregory Williams, Fareena Saqib:
A Secure Boot Framework with Multi-security Features and Logic-Locking Applications for Reconfigurable Logic. J. Hardw. Syst. Secur. 5(3): 260-268 (2021) - [c11]Yutian Gui, Ali Shuja Siddiqui, Geraldine Shirley Nicholas, Marcus Hughes, Fareena Saqib:
A Lightweight Delay-based Authentication Scheme for DMA Attack Mitigation. ISQED 2021: 263-268 - 2020
- [j2]Ali Shuja Siddiqui, Yutian Gui, Fareena Saqib:
Secure Boot for Reconfigurable Architectures. Cryptogr. 4(4): 26 (2020) - [j1]Yutian Gui, Suyash Mohan Tamore, Ali Shuja Siddiqui, Fareena Saqib:
Key Update Countermeasure for Correlation-Based Side-Channel Attacks. J. Hardw. Syst. Secur. 4(3): 167-179 (2020)
2010 – 2019
- 2019
- [c10]Yutian Gui, Ali Shuja Siddiqui, Suyash Mohan Tamore, Fareena Saqib:
Security Vulnerabilities of Smart Meters in Smart Grid. IECON 2019: 3018-3023 - [c9]Bryson Shannon, Spandana Etikala, Yutian Gui, Ali Shuja Siddiqui, Fareena Saqib:
Blockchain Based Distributed Key Provisioning and Secure Communication over CAN FD. ISVLSI 2019: 638-644 - [c8]Ali Shuja Siddiqui, Geraldine Shirley, Shreya Bendre, Girija Bhagwat, Jim Plusquellic, Fareena Saqib:
Secure Design Flow of FPGA Based RISC-V Implementation. IVSW 2019: 37-42 - [c7]Ali Shuja Siddiqui, Geraldine Shirley, Sam Reji Joseph, Yutian Gui, Jim Plusquellic, Marten van Dijk, Fareena Saqib:
Multilayer Camouflaged Secure Boot for SoCs. MTV 2019: 56-61 - 2018
- [c6]Ali Shuja Siddiqui, Yutian Gui, David Lawrence, Stuart Laval, Jim Plusquellic, Madhav D. Manjrekar, Badrul H. Chowdhury, Fareena Saqib:
Hardware Assisted Security Architecture for Smart Grid. IECON 2018: 2890-2895 - 2017
- [c5]Ali Shuja Siddiqui, Chia-Che Lee, Wenjie Che, Jim Plusquellic, Fareena Saqib:
Secure intra-vehicular communication over CANFD. AsianHOST 2017: 97-102 - [c4]Farhoud Hosseinpour, Ali Shuja Siddiqui, Juha Plosila, Hannu Tenhunen:
A Security Framework for Fog Networks Based on Role-Based Access Control and Trust Models. CONFENIS 2017: 168-180 - [c3]Ali Shuja Siddiqui, Yutian Gui, Jim Plusquellic, Fareena Saqib:
Secure communication over CANBus. MWSCAS 2017: 1264-1267 - [c2]Ali Shuja Siddiqui, Chia-Che Lee, Fareena Saqib:
Hardware based protection against malwares by PUF based access control mechanism. MWSCAS 2017: 1312-1315 - 2016
- [c1]Ali Shuja Siddiqui, Yutian Gui, Jim Plusquellic, Fareena Saqib:
Poster: Hardware based security enhanced framework for automotives. VNC 2016: 1-2
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint