dblp.uni-trier.dewww.dagstuhl.dewww.uni-trier.de

Weidong Shi (Selection)

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo


17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeidong Shi, Hsien-Hsin S. Lee: Accelerating memory decryption and authentication with frequent value prediction. Conf. Computing Frontiers 2007: 35-46
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee: Memory-Centric Security Architecture. T. HiPEAC 1: 95-115 (2007)
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang: InfoShield: a security architecture for protecting information usage in memory. HPCA 2006: 222-231
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeidong Shi, Hsien-Hsin S. Lee, Laura Falk, Mrinmoy Ghosh: An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors. ISCA 2006: 102-113
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeidong Shi, Hsien-Hsin S. Lee: Authentication Control Point and Its Implications For Secure Processor Design. MICRO 2006: 103-112
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S. Lee: M-TREE: A high efficiency security architecture for protecting integrity and privacy of software. J. Parallel Distrib. Comput. 66(9): 1116-1128 (2006)
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee: Memory-Centric Security Architecture. HiPEAC 2005: 153-168
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh: An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. ICAC 2005: 263-273
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu, Alexandra Boldyreva: High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. ISCA 2005: 14-24
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Mrinmoy Ghosh: Towards the issues in architectural support for protection of software execution. SIGARCH Computer Architecture News 33(1): 6-15 (2005)
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang: Attacks and risk analysis for hardware supported software copy protection systems. Digital Rights Management Workshop 2004: 54-62
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu: Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems. IEEE PACT 2004: 123-134

Selection of 12 from 25 records - Weidong Shi has 36 coauthors

Last update 2012-09-10 CET by the DBLP TeamThis material is Open Data Content released under the ODC-BY 1.0 license — See also our legal information page