From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Expanding Gate Level Information Flow Tracking for Multilevel Security., , , , и . IEEE Embed. Syst. Lett., 5 (2): 25-28 (2013)Special Session: CAD for Hardware Security - Automation is Key to Adoption of Solutions., , , , , , , и . VTS, стр. 1-10. IEEE, (2021)Security Verification of the OpenTitan Hardware Root of Trust., , , , и . IEEE Secur. Priv., 21 (3): 27-36 (мая 2023)Minimal Multi-threading: Finding and Removing Redundant Instructions in Multi-threaded Processors., , , , , , и . MICRO, стр. 337-348. IEEE Computer Society, (2010)Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security., , , , , , , , и . ISCA, стр. 189-200. ACM, (2011)A software-based dynamic-warp scheduling approach for load-balancing the Viola-Jones face detection algorithm on GPUs., , , , и . J. Parallel Distributed Comput., 73 (5): 677-685 (2013)SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip., , , , , , и . ISCA, стр. 583-594. ACM, (2013)A Framework for Design, Verification, and Management of SoC Access Control Systems., , , и . IEEE Trans. Computers, 72 (2): 386-400 (февраля 2023)Gate-Level Information Flow Tracking for Security Lattices., , , , , , и . ACM Trans. Design Autom. Electr. Syst., 20 (1): 2:1-2:25 (2014)Detecting Hardware Trojans with Gate-Level Information-Flow Tracking., , , и . Computer, 49 (8): 44-52 (2016)