Author of the publication

Integrating FPGA/ASIC into cryptographic storage systems to avoid re-encryption.

, , , , and . Int. J. Parallel Emergent Distributed Syst., 25 (2): 105-122 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Sub-captions Semantic-Guided Network for Image Captioning., , , , , and . ICIC (3), volume 13395 of Lecture Notes in Computer Science, page 367-379. Springer, (2022)Adaptive Learning for Weakly Labeled Streams., , , , and . KDD, page 2556-2564. ACM, (2022)Adapting to Continuous Covariate Shift via Online Density Ratio Estimation., , , and . CoRR, (2023)Modeling and Throughput Analysis for Wireless Ad Hoc Networks., , , and . VTC Spring, page 88-92. IEEE, (2008)Towards Human Decision-Making in Multi-Agent Systems., , and . IC-AI, page 535-540. CSREA Press, (2007)A New Load Balancing Scheme for Distributed Multi-Agent Simulations., , and . IC-AI, page 955-961. CSREA Press, (2008)Improvement research on transmission mechanism of adaptive forward error correction code., , and . ICCCN, page 591-. IEEE, (2005)Detecting Interacting Mutation Clusters in HIV-1 Drug Resistance.. BIOINFORMATICS, page 34-43. SciTePress, (2013)Data-Driven Facial Feature Morphing for 3D Face Synthesis.. Eurographics Italian Chapter Conference, page 91-97. Eurographics, (2006)A Novel Immune-Inspired Method for Malicious Code Extraction and Detection., , and . ICAIC (3), volume 226 of Communications in Computer and Information Science, page 501-509. Springer, (2011)