Author of the publication

Generating optimized gate level information flow tracking logic for enforcing multilevel security.

, , , , and . Automatic Control and Computer Sciences, 50 (5): 361-368 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling the factors that affect individuals' utilisation of online learning systems: An empirical study combining the task technology fit model with the theory of planned behaviour., and . BJET, 41 (6): 1003-1017 (2010)Explore New Technology Application of the Medical Classroom Teaching., , and . PAAP, page 129-133. IEEE Computer Society, (2015)Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design., , , , , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 37 (9): 1719-1732 (2018)Property Based Formal Security Verification for Hardware Trojan Detection., , , and . IVSW, page 62-67. IEEE, (2018)Arbitrary Precision and Complexity Tradeoffs for Gate-Level Information Flow Tracking., , , , , and . DAC, page 5:1-5:6. ACM, (2017)Generating optimized gate level information flow tracking logic for enforcing multilevel security., , , , and . Automatic Control and Computer Sciences, 50 (5): 361-368 (2016)Automatic Generation of Review Content in Specific Domain of Social Network Based on RNN., , , and . DSC, page 601-608. IEEE, (2018)A SiC-Based Dual-Input Buck-Boost Converter with Independent MPPT For Photovoltaic Power Systems., , , , and . IECON, page 1640-1645. IEEE, (2018)A Simplifying Logic Approach for Gate Level Information Flow Tracking., , , , , and . ChinaCom (2), volume 237 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 302-311. Springer, (2017)Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design., , , , and . IEEE Access, (2018)