From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Analysis of Secure Processor Architectures., , , и . Trans. Comput. Sci., (2010)Security analysis of confidential-compute instruction set architecture for virtualized workloads., , , , , , , и . SEED, стр. 121-131. IEEE, (2021)Single-level integrity and confidentiality protection for distributed shared memory multiprocessors., , , , и . HPCA, стр. 161-172. IEEE Computer Society, (2008)SecureME: a hardware-software approach to full system security., , , и . ICS, стр. 108-119. ACM, (2011)Making secure processors OS- and performance-friendly., , , и . ACM Trans. Archit. Code Optim., 5 (4): 16:1-16:35 (2009)SHIELDSTRAP: Making secure processors truly secure., , и . ICCD, стр. 289-296. IEEE Computer Society, (2009)Compact Leakage-Free Support for Integrity and Reliability., , , , , , и . ISCA, стр. 735-748. IEEE, (2020)Green Secure Processors: Towards Power-Efficient Secure Processor Design., и . Trans. Comput. Sci., (2010)Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly., , , и . MICRO, стр. 183-196. IEEE Computer Society, (2007)i-NVMM: a secure non-volatile main memory system with incremental encryption., и . ISCA, стр. 177-188. ACM, (2011)