Author of the publication

Superscalar Encrypted RISC: The Measure of a Secret Computer.

, , , and . TrustCom/BigDataSE, page 1336-1341. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reviews., , and . IEEE Annals of the History of Computing, 28 (2): 77-80 (2006)6800/6802 microprocessor emulation adapter.. Microprocessors and Microsystems - Embedded Hardware Design, 9 (1): 24-26 (1985)Formal Methods., , and . Encyclopedia of Software Engineering, Taylor & Francis, (2010)The use of industrial-strength formal methods., and . COMPSAC, page 332-337. IEEE Computer Society, (1997)Linking operational semantics and algebraic semantics for a probabilistic timed shared-variable language., , , , , and . J. Log. Algebr. Program., 81 (1): 2-25 (2012)Electronic Visualisation in Chemistry: From Alchemy to Art., , and . CoRR, (2013)Can Small Museums Develop Compelling, Educational and Accessible Web Resources? The Case of Accademia Carrara, and . CoRR, (2005)On the Security of Practical and Complete Homomorphic Encrypted Computation., and . IACR Cryptology ePrint Archive, (2016)A shallow embedding of Z in HOL., and . Information & Software Technology, 37 (5-6): 269-276 (1995)Egon Börger and Alexander Raschke: Modeling companion for software practitioners - Springer, 2018, XXI+349 pp, ISBN: 978-3-662-56639-8 (Paperback, £ 46.99), eISBN: 978-3-662-56641-1 (eBook, £ 36.99), http: //dx.doi.org/10.1007/978-3-662-56641-1.. Formal Asp. Comput., 30 (6): 761-762 (2018)