Author of the publication

Improving Cost, Performance, and Security of Memory Encryption and Authentication.

, , , , and . ISCA, page 179-190. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HeadPager: Page Turning with Computer Vision Based Head Interaction., , , and . ACCV Workshops (3), volume 10118 of Lecture Notes in Computer Science, page 249-257. Springer, (2016)Network Flow Spanners., and . LATIN, volume 3887 of Lecture Notes in Computer Science, page 410-422. Springer, (2006)Collective Tree Spanners and Routing in AT-free Related Graphs., , and . WG, volume 3353 of Lecture Notes in Computer Science, page 68-80. Springer, (2004)Zeta: scheduling interactive services with partial execution., , , and . SoCC, page 12. ACM, (2012)Collective Tree Spanners in Graphs with Bounded Genus, Chordality, Tree-Width, or Clique-Width., and . ISAAC, volume 3827 of Lecture Notes in Computer Science, page 583-592. Springer, (2005)Network flow spanners., and . Networks, 56 (3): 159-168 (2010)Collective Tree Spanners of Graphs., , and . SWAT, volume 3111 of Lecture Notes in Computer Science, page 64-76. Springer, (2004)Distance Approximating Trees: Complexity and Algorithms., and . CIAC, volume 3998 of Lecture Notes in Computer Science, page 260-271. Springer, (2006)Single-level integrity and confidentiality protection for distributed shared memory multiprocessors., , , , and . HPCA, page 161-172. IEEE Computer Society, (2008)KBEE: Linux Kernel Vulnerability Exploitability Exploration., , , , and . ICCEIC, page 10-15. IEEE, (2023)