Publications

Export (179) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
Filters: author is Lee  [Clear All Filters]
T
Zhang, T., Lee, R.B., "New Models of Cache Architectures Characterizing Information Leakage from Cache Side", Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2014, pp. 96-105, 2014  . Tagged XML BibTex
Zhang, T., Chen, S., Liu, F., Lee, R.B., "Side Channel Vulnerability Metrics: the Promise and the Pitfalls", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 24, 2013. Tagged XML BibTex
Zhang, T., Szefer, J., Lee, R.B., "Security Verification of Hardware-enabled Attestation Protocols", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), December 2012. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and benefits of suboptimal utility maximization", IEEE/ACM Transactions on Networking, vol. 19, issue 4, 2011  . Abstract Tagged XML BibTex
Levin, T., Dwoskin, J., Bhaskara, G., Nguyen, T., Clark, P., Lee, R.B., Irvine, C., Benzel, T., "Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture", 2nd International Conference on Trusted Computing (TRUST 2009), Oxford, U.K., pp. 133-156, April 2009. Abstract Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., "Multi-path Key Establishment Against REM Attacks in Wireless Ad Hoc Networks", IEEE Global Communications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, Nov/Dec 2009. Abstract Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "How Bad is Suboptimal Rate Allocation?", Proceedings of the 27th. Conference on Computer Communications, IEEE (INFOCOM ’08), pp. 951-959, April 13-18 2008. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and Benefits of Suboptimal Utility Maximization", submitted to IEEE Transactions on Networking, Nov. 4. Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Multi-path Key Establishment under Byzantine Attacks in Wireless Ad Hoc Networks, , 2008  . Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Reliable and Secure Distributed Storage of Critical Information, , 2008  . Tagged XML BibTex
S
Specht, S., Lee, R.B., "Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures", Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems (PDCS 2004), International Workshop on Security in Parallel and Distributed Systems, San Francisco, California, USA, pp. 543-550, Sept. 2004. Tagged XML BibTex
Shi, Z.J., Lee, R.B., "Implementation Complexity of Bit Permutation Instructions", Proceedings of the 37th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, California, Pacific Grove, California, USA, pp. 879-886, Nov. 2003. Tagged XML BibTex
Shi, Z., Yang, X., Lee, R.B., "Arbitrary Bit Permutations in One or Two Cycles", Proceedings of the 14th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2003), The Hague, The Netherlands, pp. 237-247, June 2003. Tagged XML BibTex
Shi, Z., Lee, R.B., "Subword Sorting with Versatile Permutation Instructions", Proceedings of the International Conference on Computer Design (ICCD 2002), Freiburg, Germany, pp. 234-241, Sept. 2002. Tagged XML BibTex
Shi, Z., Lee, R.B., "Bit Permutation Instructions for Accelerating Software Cryptography", Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2000), Boston, Massachusetts, USA, pp. 138-148, July 2000. Tagged XML BibTex
R
Lee, R.B., "Using Moving Target Defense for Secure Hardware Design", Princeton University Department of Electrical Engineering Technical Report CE-L2016-002, 2016  . Tagged XML BibTex
Lee, R.B., "Improving Cyber Security", Advances in Cyber Security: Technology, Operations and Experiences: Fordham University Press, pp. 37-59, 2013  . Tagged XML BibTex
Lee, R.B., Chen, Y., "Processor Accelerator for AES", Proceedings of the 2010 IEEE 8th Symposium on Application Specific Processors, Anaheim, CA, USA, pp. 71-76, June 13-14 2010. Abstract Tagged XML BibTex
Elbaz, R., Champagne, D., Gebotys, C., Lee, R.B., Potlapally, N., Torres, L., "Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines", Transactions on Computational Science IV, Lecture Notes in Computer Science (LNCS), issue 5340, pp. 1-22, March 2009. Abstract Tagged XML BibTex
Ruby Lee, P.K., UserMode SP_ISCA2005, , 2005  . Tagged XML BibTex
Lee, R.B., "Precision Architecture", IEEE computer, vol. 22, issue 1, pp. 14, 01/1989. Tagged XML BibTex
P
Schaumont, P., Lee, R., Perez, R., Bertoni, G., "Special Section on Secure Computer Architectures", IEEE Transactions on Computers, vol. 67, issue 3, March 2018. Tagged XML BibTex
Jamkhedkar, P., Szefer, J., Perez-Botero, D., Zhang, T., Triolo, G., Lee, Ruby.B., "A Framework for Realizing Security on Demand in Cloud Computing", IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, UK, December 2013. Tagged XML BibTex
Potlapally, N., Lee, R.B., Checking Integrity of Untrusted Data with Few Queries, , Princeton University Department of Electrical Engineering Technical Report CE-L2007-008, September 2007. Tagged XML BibTex
Potlapally, N., Lee, R.B., Efficient Randomness Generation Techniques for Embedded Systems, , Princeton University Department of Electrical Engineering Technical Report CE-L2007-015, December 2007. Tagged XML BibTex