Claes-Goran Granqvist

According to our database1, Claes-Goran Granqvist authored at least 21 papers between 2012 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
UV Light-Modulated Fluctuation-Enhanced Gas Sensing by Layers of Graphene Flakes/TiO2 Nanoparticles.
J. Sensors, 2020

2017
Non-Gaussian Resistance Fluctuations in Gold-Nanoparticle-Based Gas Sensors: An Appraisal of Different Evaluation Techniques.
Sensors, 2017

Drawing from hats by noise-based logic.
Int. J. Parallel Emergent Distributed Syst., 2017

2016
Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'".
CoRR, 2016

Comments On "A New Transient Attack On The Kish Key Distribution System".
CoRR, 2016

Unconditionally secure credit/debit card chip scheme and physical unclonable function.
CoRR, 2016

2015
Zero and negative energy dissipation at information-theoretic erasure.
CoRR, 2015

Random-resistor-random-temperature KLJN key exchange.
CoRR, 2015

2014
On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator.
Quantum Inf. Process., 2014

Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System.
Entropy, 2014

Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system.
CoRR, 2014

Bird's-eye view on Noise-Based Logic.
CoRR, 2014

Brain: Biological noise-based logic.
CoRR, 2014

Facts, myths and fights about the KLJN classical physical key exchanger.
CoRR, 2014

On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott.
CoRR, 2014

Do electromagnetic waves exist in a short cable at low frequencies? What does physics say?
CoRR, 2014

2013
Does information have mass? [Point of View].
Proc. IEEE, 2013

Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange.
CoRR, 2013

Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme.
CoRR, 2013

2012
Information theoretic security by the laws of classical physics
CoRR, 2012

Information Theoretic Security by the Laws of Classical Physics - (Plenary Paper).
Proceedings of the Soft Computing Applications, 2012


  Loading...