Author of the publication

GALS-Based LPSP: Implementation of a Novel Architecture for Low Power High Performance Security Processors.

, , and . IPDPS Workshops, page 542-550. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis and estimation of call admission policy parameters for multiple traffic classes in wireless ATM networks., , and . ICC, page 404-410. IEEE, (1999)Performance Analysis and Estimation of Call Admission Control Parameters in Wireless Integrated Voice and Data Networks., , and . Eur. Trans. Telecommun., 11 (4): 327-343 (2000)Performance evaluation of resource reservation and call admission policies for deterministic services in PGPS-based packet networks., , and . Comput. Commun., 25 (17): 1513-1526 (2002)Fuzzy-based Adaptive Cross layer Routing Protocol for NET., , and . ICC, page 248-253. IEEE, (2012)Performance Evaluation of Resource Reservation Policies for Rate-Controlled Earliest-Deadline-First Scheduling in Multi-Service Packet Networks., , and . Telecommun. Syst., 26 (1): 69-91 (2004)Structured Design Approach for an Optimal Programmable Synchronous Security Processor., , , and . WISA, volume 9503 of Lecture Notes in Computer Science, page 313-325. Springer, (2015)A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems., and . SecureComm, page 261-269. IEEE, (2005)Structured approach for planning signalling system No.7 networks., and . ISCC, page 109-113. IEEE Computer Society, (1997)Performance Evaluation of Resource Division Policies for PGPS Scheduling in ATM Networks., , and . NETWORKING, volume 1815 of Lecture Notes in Computer Science, page 714-726. Springer, (2000)Effect of User Mobility on the QoS Parameters for the Guard Channel Policy., , and . ISCC, page 409-415. IEEE Computer Society, (1999)