Search the dblp DataBase
Ruby B. Lee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Stephen M. Specht , Ruby B. Lee Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2004, pp:543-550 [Conf ] Ruby B. Lee Processor Architecture for Trustworthy Computers. [Citation Graph (0, 0)][DBLP ] Asia-Pacific Computer Systems Architecture Conference, 2005, pp:1-2 [Conf ] Ruby B. Lee , Xiao Yang , Zhijie Shi Validating Word-Oriented Processors for Bit and Multi-word Operations. [Citation Graph (0, 0)][DBLP ] Asia-Pacific Computer Systems Architecture Conference, 2004, pp:473-488 [Conf ] John Patrick McGregor , Yiqun Lisa Yin , Ruby B. Lee A Traitor Tracing Scheme Based on RSA for Fast Decryption. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:56-74 [Conf ] Ruby B. Lee Computer Arithmetic-A Processor Architect's Perspective. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Computer Arithmetic, 2001, pp:3-0 [Conf ] A. Murat Fiskiran , Ruby B. Lee Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields. [Citation Graph (0, 0)][DBLP ] ASAP, 2004, pp:125-136 [Conf ] Ruby B. Lee Subword Permutation Instructions for Two-Dimensional Multimedia Processing in MicroSIMD Architectures. [Citation Graph (0, 0)][DBLP ] ASAP, 2000, pp:3-14 [Conf ] Ruby B. Lee Challenges in the Design of Security-Aware Processors. [Citation Graph (0, 0)][DBLP ] ASAP, 2003, pp:2-0 [Conf ] A. Murat Fiskiran , Ruby B. Lee On-Chip Lookup Tables for Fast Symmetric-Key Encryption. [Citation Graph (0, 0)][DBLP ] ASAP, 2005, pp:356-363 [Conf ] Yedidya Hilewitz , Ruby B. Lee Fast Bit Compression and Expansion with Parallel Extract and Parallel Deposit Instructions. [Citation Graph (0, 0)][DBLP ] ASAP, 2006, pp:65-72 [Conf ] Ruby B. Lee , A. Murat Fiskiran , Zhijie Shi , Xiao Yang Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments. [Citation Graph (0, 0)][DBLP ] ASAP, 2002, pp:253-264 [Conf ] Zhijie Shi , Ruby B. Lee Bit Permutation Instructions for Accelerating Software Cryptography. [Citation Graph (0, 0)][DBLP ] ASAP, 2000, pp:138-148 [Conf ] Zhijie Shi , Xiao Yang , Ruby B. Lee Arbitrary Bit Permutations in One or Two Cycles. [Citation Graph (0, 0)][DBLP ] ASAP, 2003, pp:237-0 [Conf ] Ruby B. Lee Realtime MPEG Video via Software Decompression oon a PA-RISC Processor. [Citation Graph (0, 0)][DBLP ] COMPCON, 1995, pp:186-192 [Conf ] Ruby B. Lee , Jerome C. Huck 64-bit and Multimedia Extensions in the PA-RISC 2.0 Architecture. [Citation Graph (0, 0)][DBLP ] COMPCON, 1996, pp:152-160 [Conf ] Daniel F. Zucker , Michael J. Flynn , Ruby B. Lee Improving Performance for MPEG Players. [Citation Graph (0, 0)][DBLP ] COMPCON, 1996, pp:327-332 [Conf ] Srivaths Ravi , Paul C. Kocher , Ruby B. Lee , Gary McGraw , Anand Raghunathan Security as a new dimension in embedded system design. [Citation Graph (0, 0)][DBLP ] DAC, 2004, pp:753-760 [Conf ] Nachiketh R. Potlapally , Anand Raghunathan , Srivaths Ravi , Niraj K. Jha , Ruby B. Lee Satisfiability-based framework for enabling side-channel attacks on cryptographic software. [Citation Graph (0, 0)][DBLP ] DATE Designers' Forum, 2006, pp:18-23 [Conf ] A. Murat Fiskiran , Ruby B. Lee Performance Impact of Addressing Modes on Encryption Algorithms. [Citation Graph (0, 0)][DBLP ] ICCD, 2001, pp:542-545 [Conf ] A. Murat Fiskiran , Ruby B. Lee Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. [Citation Graph (0, 0)][DBLP ] ICCD, 2004, pp:452-457 [Conf ] John Patrick McGregor , Ruby B. Lee Architectural Enhancements for Fast Subword Permutations with Repetitions in Cryptographic Applications. [Citation Graph (0, 0)][DBLP ] ICCD, 2001, pp:453-461 [Conf ] Zhijie Shi , Ruby B. Lee Subword Sorting with Versatile Permutation Instructions. [Citation Graph (0, 0)][DBLP ] ICCD, 2002, pp:234-241 [Conf ] Xiao Yang , Ruby B. Lee Fast Subword Permutation Instructions Using Omega and Flip Network Stages. [Citation Graph (0, 0)][DBLP ] ICCD, 2000, pp:15-21 [Conf ] Zhenghong Wang , Ruby B. Lee Capacity Estimation of Non-Synchronous Covert Channels. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:170-176 [Conf ] Ruby B. Lee , A. Murat Fiskiran , Abdulla Bubsha Multimedia Instructions In IA-64. [Citation Graph (0, 0)][DBLP ] ICME, 2001, pp:- [Conf ] Xiao Yang , Ruby B. Lee PLX FP: an efficient floating-point instruction set for 3D graphics. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:137-140 [Conf ] Daniel F. Zucker , Michael J. Flynn , Ruby B. Lee A Comparison of Hardware Prefetching Techniques for Mulimedia Benchmarks. [Citation Graph (0, 0)][DBLP ] ICMCS, 1996, pp:236-244 [Conf ] Ruby B. Lee , Peter C. S. Kwan , John Patrick McGregor , Jeffrey Dwoskin , Zhenghong Wang Architecture for Protecting Critical Secrets in Microprocessors. [Citation Graph (0, 0)][DBLP ] ISCA, 2005, pp:2-13 [Conf ] Zhenghong Wang , Ruby B. Lee New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:498-505 [Conf ] A. Murat Fiskiran , Ruby B. Lee Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:526-531 [Conf ] Ruby B. Lee , Zhijie Shi , Yiqun Lisa Yin , Ronald L. Rivest , Matthew J. B. Robshaw On Permutation Operations in Cipher Design. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:569-577 [Conf ] John Patrick McGregor , Ruby B. Lee Performance Impact of Data Compression on Virtual Private Network Transactions. [Citation Graph (0, 0)][DBLP ] LCN, 2000, pp:500-510 [Conf ] Alice Yu , Ruby B. Lee , Michael J. Flynn Performance Enhancement of H.263 Encoder Based on Zero Coefficient Prediction. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 1997, pp:21-29 [Conf ] Ruby B. Lee , David K. Karig , John Patrick McGregor , Zhijie Shi Enlisting Hardware Architecture to Thwart Malicious Code Injection. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:237-252 [Conf ] Nachiketh R. Potlapally , Srivaths Ravi , Anand Raghunathan , Ruby B. Lee , Niraj K. Jha Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors. [Citation Graph (0, 0)][DBLP ] VLSI Design, 2006, pp:299-304 [Conf ] Ruby B. Lee Precision Architecture. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1989, v:22, n:1, pp:78-91 [Journal ] Thomas M. Conte , Pradeep K. Dubey , Matthew D. Jennings , Ruby B. Lee , Alex Peleg , Salliah Rathnam , Michael S. Schlansker , Peter Song , Andrew Wolfe Challenges to Combining General-Purpose and Multimedia Processors. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1997, v:30, n:12, pp:33-37 [Journal ] Ruby B. Lee , Xiao Yang , Zhijie Shi Single-Cycle Bit Permutations with MOMR Execution. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2005, v:20, n:5, pp:577-585 [Journal ] Ruby B. Lee , Zhijie Shi , Xiao Yang Cryptography Efficient Permutation Instructions for Fast Software. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 2001, v:21, n:6, pp:56-69 [Journal ] Charles R. Moore , Kevin W. Rudd , Ruby B. Lee , Pradip Bose Guest Editors' Introduction: Micro's Top Picks from Microarchitecture Conferences. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 2003, v:23, n:6, pp:8-10 [Journal ] John Patrick McGregor , Ruby B. Lee Protecting cryptographic keys and computations via virtual secure coprocessing. [Citation Graph (0, 0)][DBLP ] SIGARCH Computer Architecture News, 2005, v:33, n:1, pp:16-26 [Journal ] Daniel F. Zucker , Ruby B. Lee , Michael J. Flynn Hardware and software cache prefetching techniques for MPEG benchmarks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2000, v:10, n:5, pp:782-796 [Journal ] Zhenghong Wang , Ruby B. Lee Covert and Side Channels Due to Processor Architecture. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:473-482 [Conf ] Yedidya Hilewitz , Ruby B. Lee Performing Advanced Bit Manipulations Efficiently in General-Purpose Processors. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Computer Arithmetic, 2007, pp:251-260 [Conf ] Reouven Elbaz , David Champagne , Ruby B. Lee , Lionel Torres , Gilles Sassatelli , Pierre Guillemin TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2007, pp:289-302 [Conf ] Zhenghong Wang , Jing Deng , Ruby B. Lee Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:2531-2535 [Conf ] Zhenghong Wang , Ruby B. Lee New cache designs for thwarting software cache-based side channel attacks. [Citation Graph (0, 0)][DBLP ] ISCA, 2007, pp:494-505 [Conf ] Nachiketh R. Potlapally , Srivaths Ravi , Anand Raghunathan , Ruby B. Lee , Niraj K. Jha Configuration and Extension of Embedded Processors to Optimize IPSec Protocol Execution. [Citation Graph (0, 0)][DBLP ] IEEE Trans. VLSI Syst., 2007, v:15, n:5, pp:605-609 [Journal ] Nachiketh R. Potlapally , Anand Raghunathan , Srivaths Ravi , Niraj K. Jha , Ruby B. Lee Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. VLSI Syst., 2007, v:15, n:4, pp:465-470 [Journal ] John Patrick McGregor , Ruby B. Lee Architectural techniques for accelerating subword permutations with repetitions. [Citation Graph (0, 0)][DBLP ] IEEE Trans. VLSI Syst., 2003, v:11, n:3, pp:325-335 [Journal ] Bit matrix multiplication in commodity processors. [Citation Graph (, )][DBLP ] Hardware-rooted trust for secure key management and transient trust. [Citation Graph (, )][DBLP ] Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. [Citation Graph (, )][DBLP ] How Bad is Suboptimal Rate Allocation? [Citation Graph (, )][DBLP ] NoHype: virtualized cloud infrastructure without the virtualization. [Citation Graph (, )][DBLP ] The Reduced Address Space (RAS) for Application Memory Authentication. [Citation Graph (, )][DBLP ] Hardware-Assisted Application-Level Access Control. [Citation Graph (, )][DBLP ] A novel cache architecture with enhanced performance and security. [Citation Graph (, )][DBLP ] Accountability in hosted virtual networks. [Citation Graph (, )][DBLP ] Secure Key Management Architecture Against Sensor-Node Fabrication Attacks. [Citation Graph (, )][DBLP ] Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP ] Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. [Citation Graph (, )][DBLP ] Forward-Secure Content Distribution to Reconfigurable Hardware. [Citation Graph (, )][DBLP ] Search in 0.026secs, Finished in 0.030secs