From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Threats and Challenges in Reconfigurable Hardware Security., и . ERSA, стр. 334-345. CSREA Press, (2008)Hardware assistance for trustworthy systems through 3-D integration., , , , , , и . ACSAC, стр. 199-210. ACM, (2010)Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems., , , , , , , и . S&P, стр. 281-295. IEEE Computer Society, (2007)Trustworthy System Security through 3-D Integrated Hardware., , , , , , и . HOST, стр. 91-92. IEEE Computer Society, (2008)Security Checkers: Detecting processor malicious inclusions at runtime., , , и . HOST, стр. 34-39. IEEE Computer Society, (2011)SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip., , , , , , и . ISCA, стр. 583-594. ACM, (2013)A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors., , , , , , и . Cryptography and Security, том 6805 из Lecture Notes in Computer Science, стр. 364-382. Springer, (2012)Wavelet-based phase classification., и . PACT, стр. 95-104. ACM, (2006)Policy-Driven Memory Protection for Reconfigurable Hardware., , , и . ESORICS, том 4189 из Lecture Notes in Computer Science, стр. 461-478. Springer, (2006)Hardware trust implications of 3-D integration., , , , , , , и . WESS, стр. 1. ACM, (2010)