From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Closed-loop-based self-adaptive Hardware/Software-Embedded systems: Design methodology and smart cam case study., , и . ACM Trans. Embed. Comput. Syst., 10 (3): 38:1-38:28 (2011)WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks., , , , , , и . IEEE Access, (2020)Protecting Behavioral IPs During Design Time: Key-Based Obfuscation Techniques for HLS in the Cloud., , , и . Behavioral Synthesis for Hardware Security, (2022)IBC-EI: An Instruction Based Compression method with Encryption and Integrity Checking., , , , , , и . ReCoSoC, стр. 138-145. Univ. Montpellier II, (2007)Asymmetric Cache Coherency: Policy Modifications to Improve Multicore Performance., , и . ACM Trans. Reconfigurable Technol. Syst., 5 (3): 12:1-12:12 (2012)Design and Implementation of a Multi-Core Crypto-Processor for Software Defined Radios., , , , и . ARC, том 6578 из Lecture Notes in Computer Science, стр. 29-40. Springer, (2011)Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections., , , , , , , и . EuroS&P Workshops, стр. 304-310. IEEE, (2023)3DMIA: a multi-objective artificial immune algorithm for 3D-MPSoC multi-application 3D-NoC mapping., , , , , и . GECCO (Companion), стр. 167-168. ACM, (2013)Dynamic NoC-based architecture for MPSoC security implementation., , , , и . SBCCI, стр. 197-202. ACM, (2011)Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm., , , , , и . GIIS, стр. 1-5. IEEE, (2018)