From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IBC-EI: An Instruction Based Compression method with Encryption and Integrity Checking., , , , , , и . ReCoSoC, стр. 138-145. Univ. Montpellier II, (2007)Closed-loop-based self-adaptive Hardware/Software-Embedded systems: Design methodology and smart cam case study., , и . ACM Trans. Embed. Comput. Syst., 10 (3): 38:1-38:28 (2011)Protecting Behavioral IPs During Design Time: Key-Based Obfuscation Techniques for HLS in the Cloud., , , и . Behavioral Synthesis for Hardware Security, (2022)Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections., , , , , , , и . EuroS&P Workshops, стр. 304-310. IEEE, (2023)Design and Implementation of a Multi-Core Crypto-Processor for Software Defined Radios., , , , и . ARC, том 6578 из Lecture Notes in Computer Science, стр. 29-40. Springer, (2011)3DMIA: a multi-objective artificial immune algorithm for 3D-MPSoC multi-application 3D-NoC mapping., , , , , и . GECCO (Companion), стр. 167-168. ACM, (2013)Dynamic NoC-based architecture for MPSoC security implementation., , , , и . SBCCI, стр. 197-202. ACM, (2011)3D-LeukoNoC: A dynamic NoC protection., , , , , и . ReConFig, стр. 1-6. IEEE, (2014)A small and adaptive coprocessor for information flow tracking in ARM SoCs., , , , , , и . ReConFig, стр. 1-8. IEEE, (2018)IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction., , и . SEC, том 580 из IFIP Advances in Information and Communication Technology, стр. 32-45. Springer, (2020)