2007 |
17 | EE | Weidong Shi,
Hsien-Hsin S. Lee:
Accelerating memory decryption and authentication with frequent value prediction.
Conf. Computing Frontiers 2007: 35-46 |
16 | EE | Bogdan Carbunar,
Yang Yu,
Weidong Shi,
Michael Pearce,
Venu Vasudevan:
Query privacy in wireless sensor networks.
SECON 2007: 203-212 |
15 | EE | Weidong Shi,
Chenghuai Lu,
Hsien-Hsin S. Lee:
Memory-Centric Security Architecture.
T. HiPEAC 1: 95-115 (2007) |
2006 |
14 | EE | Weidong Shi,
Joshua B. Fryman,
Guofei Gu,
Hsien-Hsin S. Lee,
Youtao Zhang,
Jun Yang:
InfoShield: a security architecture for protecting information usage in memory.
HPCA 2006: 222-231 |
13 | EE | Weidong Shi,
Hsien-Hsin S. Lee,
Laura Falk,
Mrinmoy Ghosh:
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors.
ISCA 2006: 102-113 |
12 | EE | Weidong Shi,
Hsien-Hsin S. Lee:
Authentication Control Point and Its Implications For Secure Processor Design.
MICRO 2006: 103-112 |
11 | EE | Chenghuai Lu,
Tao Zhang,
Weidong Shi,
Hsien-Hsin S. Lee:
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software.
J. Parallel Distrib. Comput. 66(9): 1116-1128 (2006) |
2005 |
10 | EE | Weidong Shi,
Chenghuai Lu,
Hsien-Hsin S. Lee:
Memory-Centric Security Architecture.
HiPEAC 2005: 153-168 |
9 | EE | Weidong Shi,
Hsien-Hsin S. Lee,
Guofei Gu,
Laura Falk,
Trevor N. Mudge,
Mrinmoy Ghosh:
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor.
ICAC 2005: 263-273 |
8 | EE | Weidong Shi,
Hsien-Hsin S. Lee,
Mrinmoy Ghosh,
Chenghuai Lu,
Alexandra Boldyreva:
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation.
ISCA 2005: 14-24 |
7 | EE | Weidong Shi,
Hsien-Hsin S. Lee,
Chenghuai Lu,
Mrinmoy Ghosh:
Towards the issues in architectural support for protection of software execution.
SIGARCH Computer Architecture News 33(1): 6-15 (2005) |
2004 |
6 | EE | Weidong Shi,
Tao Zhang,
Santosh Pande:
Static Techniques to Improve Power Efficiency of Branch Predictors.
Asia-Pacific Computer Systems Architecture Conference 2004: 385-398 |
5 | EE | Weidong Shi,
Hsien-Hsin S. Lee,
Chenghuai Lu,
Tao Zhang:
Attacks and risk analysis for hardware supported software copy protection systems.
Digital Rights Management Workshop 2004: 54-62 |
4 | EE | Tao Zhang,
Weidong Shi,
Santosh Pande:
Static Techniques to Improve Power Efficiency of Branch Predictors.
HiPC 2004: 274-285 |
3 | EE | Weidong Shi,
Hsien-Hsin S. Lee,
Mrinmoy Ghosh,
Chenghuai Lu:
Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems.
IEEE PACT 2004: 123-134 |
2003 |
2 | EE | Weidong Shi,
Kalyan S. Perumalla,
Richard M. Fujimoto:
Power-aware State Dissemination in Mobile Distributed Virtual Environments.
PADS 2003: 181 |
2002 |
1 | EE | Weidong Shi,
Xiaotong Zhuang,
Indrani Paul,
Karsten Schwan:
Efficient Implementation of Packet Scheduling Algorithm on High-Speed Programmable Network Processors.
MMNS 2002: 184-197 |