Author of the publication

Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units.

, , , , and . SIN, page 166-173. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel methodology for robust VBR video transmission in an ATM system., , and . Int. J. Netw. Manag., 12 (6): 347-355 (2002)Intelligent Internet of Things (IoT) Node Demonstrator for Device Monitoring and Control in the Oil and Gas Sector., and . CoRR, (2019)Characteristics of WAP Traffic., and . Wirel. Networks, 10 (1): 71-81 (2004)Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy., , and . Sensors, 21 (1): 28 (2021)Bandwidth Efficient Secure Authentication and Encryption Techniques on IEC-60870-5-104 for Remote Outstations., , , , , and . SmartNets, page 1-6. IEEE, (2021)IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't., and . IEEE Consumer Electron. Mag., 5 (2): 79-86 (2016)NB-IoT Testbed for Industrial Internet of Things., , and . ISNCC, page 1-6. IEEE, (2020)Organisational Contexts of Energy Cybersecurity., , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 384-402. Springer, (2021)Satellite-based study of water quality of Chilko lake (British Columbia, Canada): Impact on Sockeye salmon., , , , , , and . IGARSS, page 3858-3861. IEEE, (2014)A Key Agile 17.4 Gbit/sec Camellia Implementation., , and . FPL, volume 3203 of Lecture Notes in Computer Science, page 546-554. Springer, (2004)