au.\*:("ZHIJIE SHI")
Results 1 to 5 of 5
Selection :
Subword sorting with versatile permutation instructionsZHIJIE SHI; LEE, Ruby B.Proceedings, IEEE International Conference on Computer Design. 2002, pp 234-241, issn 1063-6404, isbn 0-7695-1700-5, 8 p.Conference Paper
Enhanced Side-Channel Cube Attacks on PRESENTXINJIE ZHAO; SHIZE GUO; FAN ZHANG et al.IEICE transactions on fundamentals of electronics, communications and computer science. 2013, Vol 96, Num 1, pp 332-339, issn 0916-8508, 8 p.Article
Scalable Localization with Mobility Prediction for Underwater Sensor NetworksZHONG ZHOU; ZHENG PENG; CUI, Jun-Hong et al.IEEE transactions on mobile computing. 2011, Vol 10, Num 3, pp 335-348, issn 1536-1233, 14 p.Article
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AESXINJIE ZHAO; SHIZE GUO; FAN ZHANG et al.Computers & security. 2013, Vol 39, pp 173-189, issn 0167-4048, 17 p., bArticle
Enlisting hardware architecture to thwart malicious code injectionLEE, Ruby B; KARIG, David K; MCGREGOR, John P et al.Lecture notes in computer science. 2004, pp 237-252, issn 0302-9743, isbn 3-540-20887-9, 16 p.Conference Paper