From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Instruction set extensions for photonic synchronous coalesced accesses., , и . HPEC, стр. 1-4. IEEE, (2013)Functionality and Security Co-design Environment for Embedded Systems., , , , и . HPEC, стр. 1-5. IEEE, (2018)Zero Trust Architecture Approach for Developing Mission Critical Embedded Systems., , , , , , , , , и 2 other автор(ы). HPEC, стр. 1-5. IEEE, (2023)Systems design of cybersecurity in embedded systems., , , , , , , , , и . HPEC, стр. 1-6. IEEE, (2016)A key-centric processor architecture for secure computing., , и . HOST, стр. 173-178. IEEE Computer Society, (2016)PipeRench: A virtualized programmable datapath in 0.18 micron technology., , , , , и . CICC, стр. 63-66. IEEE, (2002)Secure architecture for embedded systems., , , , , , и . HPEC, стр. 1-5. IEEE, (2015)SHAMROCK: self contained cryptography and key management processor., , , , и . ACM Conference on Computer and Communications Security, стр. 1419-1420. ACM, (2013)Agile and Resilient Embedded Systems., , , , , , , , , и 6 other автор(ы). MILCOM, стр. 715-720. IEEE, (2021)Mission Assurance: Beyond Secure Processing., , , , , , , , , и . QRS Companion, стр. 593-598. IEEE, (2018)