Author of the publication

Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.

, , , , , , , and . Cybersecur., 1 (1): 2 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing., , , , , , , and . Cybersecur., 1 (1): 2 (2018)A 100 GOPS ASP based baseband processor for wireless communication., , , , , and . DATE, page 121-124. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Colored Petri Net Based Cache Side Channel Vulnerability Evaluation., , , and . IEEE Access, (2019)Polar Codes with Local-Global Decoding., , and . CoRR, (2023)System-level design methodology enabling fast development of baseband MP-SoC for 4G small cell base station., , and . DATE, page 1-6. European Design and Automation Association, (2014)An accurate ACOSSO metamodeling technique for processor architecture design space exploration., , , and . ASP-DAC, page 689-694. IEEE, (2015)Polar Codes with Local-Global Decoding., , and . IEEECONF, page 392-396. IEEE, (2022)Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors., , and . ISCC, page 970-976. IEEE, (2023)Analysis of DRAM Vulnerability Using Computation Tree Logic., , , , , and . ICC, page 986-991. IEEE, (2022)SCPORAM: a hardware support scheme for protecting memory access patterns., , , , and . TrustCom, page 983-990. IEEE, (2020)