From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification., , , и . DAC, стр. 175:1-175:4. ACM, (2014)Architectural Security Regulation., , и . IEEE Comput. Archit. Lett., 22 (2): 173-176 (июля 2023)CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management., , и . USENIX Security Symposium, стр. 1057-1074. USENIX Association, (2017)HARDROID: Transparent Integration of Crypto Accelerators in Android., , , и . HPEC, стр. 1-8. IEEE, (2021)ZeRØ: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks., , , и . ISCA, стр. 999-1012. IEEE, (2021)Practical Memory Safety with REST., и . ISCA, стр. 600-611. IEEE Computer Society, (2018)Evaluation of an Analog Accelerator for Linear Algebra., , , , и . ISCA, стр. 570-582. IEEE Computer Society, (2016)Hardware enhanced security., , и . CCS, стр. 1052. ACM, (2012)Composable Lightweight Processors., , , , , , и . MICRO, стр. 381-394. IEEE Computer Society, (2007)Silencing Hardware Backdoors., и . IEEE Symposium on Security and Privacy, стр. 49-63. IEEE Computer Society, (2011)