Author of the publication

Accelerated Processing of Secure Email by Exploiting Built-in Security Features on the Intel EP80579 Integrated Processor with Intel QuickAssist Technology.

, , and . SRDS Workshops, page 1-8. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Insecure Programming: How Culpable is a Language's Syntax?, , , and . IAW, page 158-163. IEEE, (2003)Implementation of a Gracefully Degradable Binary Tree in Programmable., and . DFT, page 28-36. IEEE Computer Society, (1994)Data De-duplication and Event Processing for Security Applications on an Embedded Processor., , and . SRDS, page 418-423. IEEE Computer Society, (2012)Inferring Sources of Leaks in Document Management Systems., , and . IFIP Int. Conf. Digital Forensics, volume 285 of IFIP, page 291-306. Springer, (2008)Design Considerations for High Performance RF Cores Based on Process Variation Study., , , , , , and . J. Electron. Test., 24 (1-3): 143-155 (2008)Minimizing concurrent test time in SoC's by balancing resource usage., , and . ACM Great Lakes Symposium on VLSI, page 77-82. ACM, (2002)Sensitivity analysis in keystroke dynamics using convolutional neural networks., and . WIFS, page 1-6. IEEE, (2017)A New Framework For Automatic Generation, Insertion and Verification of Memory Built-In Self Test Units., and . VTS, page 391-397. IEEE Computer Society, (1999)Control Constrained Resource Partitioning for Complex SoCs., , and . DFT, page 425-432. IEEE Computer Society, (2003)A Novel Approach for Security and Robustness in Wireless Embedded Systems., , and . SEUS, volume 5287 of Lecture Notes in Computer Science, page 323-335. Springer, (2008)