Author of the publication

Single-level integrity and confidentiality protection for distributed shared memory multiprocessors.

, , , , and . HPCA, page 161-172. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transactional pre-abort handlers in hardware transactional memory., , and . PACT, page 33:1-33:11. ACM, (2018)Using Software Logging to Support Multi-Version Buffering in Thread-Level Speculation., , , , , and . IEEE PACT, page 170-181. IEEE Computer Society, (2003)A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit., , , and . HPCA, page 123-138. IEEE, (2020)A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms., , , and . MILCOM, page 855-860. IEEE, (2021)ReEnact: Using Thread-Level Speculation Mechanisms to Debug Data Races in Multithreaded Codes., and . ISCA, page 110-121. IEEE Computer Society, (2003)CORD: cost-effective (and nearly overhead-free) order-recording and data race detection.. HPCA, page 232-243. IEEE Computer Society, (2006)SecureME: a hardware-software approach to full system security., , , and . ICS, page 108-119. ACM, (2011)Capacity of Deliberate Side-Channels Created by Software Activities., , and . MILCOM, page 237-242. IEEE, (2018)PEEP: Exploiting predictability of memory dependences in SMT processors., , and . HPCA, page 137-148. IEEE Computer Society, (2008)Single-level integrity and confidentiality protection for distributed shared memory multiprocessors., , , , and . HPCA, page 161-172. IEEE Computer Society, (2008)