Author of the publication

SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk.

, , , , , and . TrustCom, page 381-388. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal region gradated fusion based automatic image stitching for industrial systems., , , , , and . ICIT, page 1-7. IEEE, (2022)Optimizing Pointwise Convolutions on Multi-core DSPs., , , , and . ICA3PP (7), volume 14493 of Lecture Notes in Computer Science, page 209-223. Springer, (2023)PruX: Communication Pruning of Parallel BFS in the Graph 500 Benchmark., , , and . ICA3PP (1), volume 11334 of Lecture Notes in Computer Science, page 106-121. Springer, (2018)Parallel convolution algorithm using implicit matrix multiplication on multi-core CPUs., , , and . IJCNN, page 1-7. IEEE, (2019)Model Provenance Management in MLOps Pipeline., , , and . ICCDE, page 45-50. ACM, (2022)An Active Data Leakage Prevention Model for Insider Threat., , , , and . IPTC, page 39-42. IEEE Computer Society, (2011)GraphMedia: Communication-balanced Graph Searching for Billion-scale Social Media Access., , , , , , , and . ACM Multimedia, page 8984-8993. ACM, (2023)NUMA-aware FFT-based Convolution on ARMv8 Many-core CPUs., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1019-1026. IEEE, (2021)Astrape: An Efficient Concurrent Cloud Attestation with Ciphertext-Policy Attribute-Based Encryption., , , , , , and . Symmetry, 10 (10): 425 (2018)Evaluating FFT-based Algorithms for Strided Convolutions on ARMv8 Architectures?, , , , , and . SIGMETRICS Perform. Evaluation Rev., 49 (3): 28-29 (2022)