From post

Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly.

, , , и . MICRO, стр. 183-196. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Feeding method and health outcomes of children with cerebral palsy.. J Pediatr, 145 (2 Suppl): S28--S32 (августа 2004)Processor architecture for software implementation of multi-sector G-RAKE receivers for HSUPA wireless infrastructure., , , , , и . ICASSP, стр. 2770-2774. IEEE, (2013)SecureME: a hardware-software approach to full system security., , , и . ICS, стр. 108-119. ACM, (2011)Single-level integrity and confidentiality protection for distributed shared memory multiprocessors., , , , и . HPCA, стр. 161-172. IEEE Computer Society, (2008)SHIELDSTRAP: Making secure processors truly secure., , и . ICCD, стр. 289-296. IEEE Computer Society, (2009)Improving Cost, Performance, and Security of Memory Encryption and Authentication., , , , и . ISCA, стр. 179-190. IEEE Computer Society, (2006)Similarities between motion parallax and stereopsis in human depth perception, и . Vision research, 22 (2): 261--270 (1982)Motion parallax as an independent cue for depth perception, и . Perception, 8 (2): 125--134 (1979)Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly., , , и . MICRO, стр. 183-196. IEEE Computer Society, (2007)Efficient data protection for distributed shared memory multiprocessors., , и . PACT, стр. 84-94. ACM, (2006)