Author of the publication

A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags.

, , , , and . MICRO, page 94-105. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security., , , , , , , , and . ISCA, page 189-200. ACM, (2011)A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags., , , , and . MICRO, page 94-105. IEEE Computer Society, (2008)Trustworthy System Security through 3-D Integrated Hardware., , , , , , and . HOST, page 91-92. IEEE Computer Society, (2008)A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors., , , , , , and . Cryptography and Security, volume 6805 of Lecture Notes in Computer Science, page 364-382. Springer, (2012)Hardware trust implications of 3-D integration., , , , , , , and . WESS, page 1. ACM, (2010)Hardware assistance for trustworthy systems through 3-D integration., , , , , , and . ACSAC, page 199-210. ACM, (2010)Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design., , , , , , , , , and 2 other author(s). ICCAD, page 157:1-157:9. ACM, (2022)