From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Newcache: Secure Cache Architecture Thwarting Cache Side-Channel Attacks., , , и . IEEE Micro, 36 (5): 8-16 (2016)Single-Cycle Bit Permutations with MOMR Execution., , и . J. Comput. Sci. Technol., 20 (5): 577-585 (2005)Cloud Server Benchmarks for Performance Evaluation of New Hardware Architecture., , и . CoRR, (2016)Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning., , , , и . TrustCom/BigDataSE, стр. 160-167. IEEE, (2019)Implicit Authentication for Smartphone Security., и . ICISSP (Revised Selected Papers), том 576 из Communications in Computer and Information Science, стр. 160-176. Springer, (2015)Validating Word-Oriented Processors for Bit and Multi-word Operations., , и . Asia-Pacific Computer Systems Architecture Conference, том 3189 из Lecture Notes in Computer Science, стр. 473-488. Springer, (2004)HotChips security tutorial., , , и . Hot Chips Symposium, стр. 1-5. IEEE, (2014)Protecting cryptographic keys and computations via virtual secure coprocessing., и . SIGARCH Comput. Archit. News, 33 (1): 16-26 (2005)Rethinking Computers for Cybersecurity.. Computer, 48 (4): 16-25 (2015)Hardware-rooted trust for secure key management and transient trust., и . ACM Conference on Computer and Communications Security, стр. 389-400. ACM, (2007)