Author of the publication

Flexible Software Protection Using Hardware/Software Codesign Techniques.

, , , and . DATE, page 636-641. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HomeOS: Context-Aware Home Connectivity., , , , and . International Conference on Wireless Networks, page 739-744. CSREA Press, (2004)Second Derivative Algorithms for Optimal Resource Allocation in Distributed Computer Systems., and . ICDCS, page 56-63. IEEE Computer Society, (1987)Automation for Creating and Configuring Security Manifests for Hardware Containers., , and . SafeConfig, IEEE, (2011)Fast Simulation of a Voice-Data Multiplexer., and . INFOCOM, page 361-368. IEEE Computer Society, (1995)Routing and Scheduling I/O Transfers on Wormhole-Routed Mesh Networks., , , and . J. Parallel Distributed Comput., 57 (1): 1-13 (1999)A compiler-hardware approach to software protection for embedded systems., , , and . Comput. Electr. Eng., 35 (2): 315-328 (2009)File allocation for a parallel Webserver., , , and . HiPC, page 16-21. IEEE Computer Society, (1996)n-Modular Redundant Real-Time Middleware: Design and Implementation., , , and . EWiLi, volume 1697 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains., , , and . DSD, page 163-170. IEEE Computer Society, (2012)Addressing application integrity attacks using a reconfigurable architecture., , and . FPGA, page 250. ACM, (2004)