From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Expanding Gate Level Information Flow Tracking for Multilevel Security., , , , и . IEEE Embed. Syst. Lett., 5 (2): 25-28 (2013)Special Session: CAD for Hardware Security - Automation is Key to Adoption of Solutions., , , , , , , и . VTS, стр. 1-10. IEEE, (2021)Security Verification of the OpenTitan Hardware Root of Trust., , , , и . IEEE Secur. Priv., 21 (3): 27-36 (мая 2023)Minimal Multi-threading: Finding and Removing Redundant Instructions in Multi-threaded Processors., , , , , , и . MICRO, стр. 337-348. IEEE Computer Society, (2010)Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security., , , , , , , , и . ISCA, стр. 189-200. ACM, (2011)Eliminating Timing Information Flows in a Mix-Trusted System-on-Chip., , и . IEEE Des. Test, 30 (2): 55-62 (2013)Detecting Hardware Trojans with Gate-Level Information-Flow Tracking., , , и . Computer, 49 (8): 44-52 (2016)Gate-Level Information Flow Tracking for Security Lattices., , , , , , и . ACM Trans. Design Autom. Electr. Syst., 20 (1): 2:1-2:25 (2014)Simultaneous information flow security and circuit redundancy in Boolean gates., , , и . ICCAD, стр. 585-590. ACM, (2012)A software-based dynamic-warp scheduling approach for load-balancing the Viola-Jones face detection algorithm on GPUs., , , , и . J. Parallel Distributed Comput., 73 (5): 677-685 (2013)