The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ruby B. Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stephen M. Specht, Ruby B. Lee
    Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:543-550 [Conf]
  2. Ruby B. Lee
    Processor Architecture for Trustworthy Computers. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2005, pp:1-2 [Conf]
  3. Ruby B. Lee, Xiao Yang, Zhijie Shi
    Validating Word-Oriented Processors for Bit and Multi-word Operations. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2004, pp:473-488 [Conf]
  4. John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
    A Traitor Tracing Scheme Based on RSA for Fast Decryption. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:56-74 [Conf]
  5. Ruby B. Lee
    Computer Arithmetic-A Processor Architect's Perspective. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Computer Arithmetic, 2001, pp:3-0 [Conf]
  6. A. Murat Fiskiran, Ruby B. Lee
    Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields. [Citation Graph (0, 0)][DBLP]
    ASAP, 2004, pp:125-136 [Conf]
  7. Ruby B. Lee
    Subword Permutation Instructions for Two-Dimensional Multimedia Processing in MicroSIMD Architectures. [Citation Graph (0, 0)][DBLP]
    ASAP, 2000, pp:3-14 [Conf]
  8. Ruby B. Lee
    Challenges in the Design of Security-Aware Processors. [Citation Graph (0, 0)][DBLP]
    ASAP, 2003, pp:2-0 [Conf]
  9. A. Murat Fiskiran, Ruby B. Lee
    On-Chip Lookup Tables for Fast Symmetric-Key Encryption. [Citation Graph (0, 0)][DBLP]
    ASAP, 2005, pp:356-363 [Conf]
  10. Yedidya Hilewitz, Ruby B. Lee
    Fast Bit Compression and Expansion with Parallel Extract and Parallel Deposit Instructions. [Citation Graph (0, 0)][DBLP]
    ASAP, 2006, pp:65-72 [Conf]
  11. Ruby B. Lee, A. Murat Fiskiran, Zhijie Shi, Xiao Yang
    Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments. [Citation Graph (0, 0)][DBLP]
    ASAP, 2002, pp:253-264 [Conf]
  12. Zhijie Shi, Ruby B. Lee
    Bit Permutation Instructions for Accelerating Software Cryptography. [Citation Graph (0, 0)][DBLP]
    ASAP, 2000, pp:138-148 [Conf]
  13. Zhijie Shi, Xiao Yang, Ruby B. Lee
    Arbitrary Bit Permutations in One or Two Cycles. [Citation Graph (0, 0)][DBLP]
    ASAP, 2003, pp:237-0 [Conf]
  14. Ruby B. Lee
    Realtime MPEG Video via Software Decompression oon a PA-RISC Processor. [Citation Graph (0, 0)][DBLP]
    COMPCON, 1995, pp:186-192 [Conf]
  15. Ruby B. Lee, Jerome C. Huck
    64-bit and Multimedia Extensions in the PA-RISC 2.0 Architecture. [Citation Graph (0, 0)][DBLP]
    COMPCON, 1996, pp:152-160 [Conf]
  16. Daniel F. Zucker, Michael J. Flynn, Ruby B. Lee
    Improving Performance for MPEG Players. [Citation Graph (0, 0)][DBLP]
    COMPCON, 1996, pp:327-332 [Conf]
  17. Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan
    Security as a new dimension in embedded system design. [Citation Graph (0, 0)][DBLP]
    DAC, 2004, pp:753-760 [Conf]
  18. Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi, Niraj K. Jha, Ruby B. Lee
    Satisfiability-based framework for enabling side-channel attacks on cryptographic software. [Citation Graph (0, 0)][DBLP]
    DATE Designers' Forum, 2006, pp:18-23 [Conf]
  19. A. Murat Fiskiran, Ruby B. Lee
    Performance Impact of Addressing Modes on Encryption Algorithms. [Citation Graph (0, 0)][DBLP]
    ICCD, 2001, pp:542-545 [Conf]
  20. A. Murat Fiskiran, Ruby B. Lee
    Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. [Citation Graph (0, 0)][DBLP]
    ICCD, 2004, pp:452-457 [Conf]
  21. John Patrick McGregor, Ruby B. Lee
    Architectural Enhancements for Fast Subword Permutations with Repetitions in Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    ICCD, 2001, pp:453-461 [Conf]
  22. Zhijie Shi, Ruby B. Lee
    Subword Sorting with Versatile Permutation Instructions. [Citation Graph (0, 0)][DBLP]
    ICCD, 2002, pp:234-241 [Conf]
  23. Xiao Yang, Ruby B. Lee
    Fast Subword Permutation Instructions Using Omega and Flip Network Stages. [Citation Graph (0, 0)][DBLP]
    ICCD, 2000, pp:15-21 [Conf]
  24. Zhenghong Wang, Ruby B. Lee
    Capacity Estimation of Non-Synchronous Covert Channels. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:170-176 [Conf]
  25. Ruby B. Lee, A. Murat Fiskiran, Abdulla Bubsha
    Multimedia Instructions In IA-64. [Citation Graph (0, 0)][DBLP]
    ICME, 2001, pp:- [Conf]
  26. Xiao Yang, Ruby B. Lee
    PLX FP: an efficient floating-point instruction set for 3D graphics. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:137-140 [Conf]
  27. Daniel F. Zucker, Michael J. Flynn, Ruby B. Lee
    A Comparison of Hardware Prefetching Techniques for Mulimedia Benchmarks. [Citation Graph (0, 0)][DBLP]
    ICMCS, 1996, pp:236-244 [Conf]
  28. Ruby B. Lee, Peter C. S. Kwan, John Patrick McGregor, Jeffrey Dwoskin, Zhenghong Wang
    Architecture for Protecting Critical Secrets in Microprocessors. [Citation Graph (0, 0)][DBLP]
    ISCA, 2005, pp:2-13 [Conf]
  29. Zhenghong Wang, Ruby B. Lee
    New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:498-505 [Conf]
  30. A. Murat Fiskiran, Ruby B. Lee
    Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:526-531 [Conf]
  31. Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw
    On Permutation Operations in Cipher Design. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:569-577 [Conf]
  32. John Patrick McGregor, Ruby B. Lee
    Performance Impact of Data Compression on Virtual Private Network Transactions. [Citation Graph (0, 0)][DBLP]
    LCN, 2000, pp:500-510 [Conf]
  33. Alice Yu, Ruby B. Lee, Michael J. Flynn
    Performance Enhancement of H.263 Encoder Based on Zero Coefficient Prediction. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 1997, pp:21-29 [Conf]
  34. Ruby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi
    Enlisting Hardware Architecture to Thwart Malicious Code Injection. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:237-252 [Conf]
  35. Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Ruby B. Lee, Niraj K. Jha
    Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors. [Citation Graph (0, 0)][DBLP]
    VLSI Design, 2006, pp:299-304 [Conf]
  36. Ruby B. Lee
    Precision Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1989, v:22, n:1, pp:78-91 [Journal]
  37. Thomas M. Conte, Pradeep K. Dubey, Matthew D. Jennings, Ruby B. Lee, Alex Peleg, Salliah Rathnam, Michael S. Schlansker, Peter Song, Andrew Wolfe
    Challenges to Combining General-Purpose and Multimedia Processors. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:12, pp:33-37 [Journal]
  38. Ruby B. Lee, Xiao Yang, Zhijie Shi
    Single-Cycle Bit Permutations with MOMR Execution. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2005, v:20, n:5, pp:577-585 [Journal]
  39. Ruby B. Lee, Zhijie Shi, Xiao Yang
    Cryptography Efficient Permutation Instructions for Fast Software. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2001, v:21, n:6, pp:56-69 [Journal]
  40. Charles R. Moore, Kevin W. Rudd, Ruby B. Lee, Pradip Bose
    Guest Editors' Introduction: Micro's Top Picks from Microarchitecture Conferences. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2003, v:23, n:6, pp:8-10 [Journal]
  41. John Patrick McGregor, Ruby B. Lee
    Protecting cryptographic keys and computations via virtual secure coprocessing. [Citation Graph (0, 0)][DBLP]
    SIGARCH Computer Architecture News, 2005, v:33, n:1, pp:16-26 [Journal]
  42. Daniel F. Zucker, Ruby B. Lee, Michael J. Flynn
    Hardware and software cache prefetching techniques for MPEG benchmarks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2000, v:10, n:5, pp:782-796 [Journal]
  43. Zhenghong Wang, Ruby B. Lee
    Covert and Side Channels Due to Processor Architecture. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:473-482 [Conf]
  44. Yedidya Hilewitz, Ruby B. Lee
    Performing Advanced Bit Manipulations Efficiently in General-Purpose Processors. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Computer Arithmetic, 2007, pp:251-260 [Conf]
  45. Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin
    TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:289-302 [Conf]
  46. Zhenghong Wang, Jing Deng, Ruby B. Lee
    Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2531-2535 [Conf]
  47. Zhenghong Wang, Ruby B. Lee
    New cache designs for thwarting software cache-based side channel attacks. [Citation Graph (0, 0)][DBLP]
    ISCA, 2007, pp:494-505 [Conf]
  48. Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Ruby B. Lee, Niraj K. Jha
    Configuration and Extension of Embedded Processors to Optimize IPSec Protocol Execution. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. VLSI Syst., 2007, v:15, n:5, pp:605-609 [Journal]
  49. Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi, Niraj K. Jha, Ruby B. Lee
    Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. VLSI Syst., 2007, v:15, n:4, pp:465-470 [Journal]
  50. John Patrick McGregor, Ruby B. Lee
    Architectural techniques for accelerating subword permutations with repetitions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. VLSI Syst., 2003, v:11, n:3, pp:325-335 [Journal]

  51. Bit matrix multiplication in commodity processors. [Citation Graph (, )][DBLP]


  52. Hardware-rooted trust for secure key management and transient trust. [Citation Graph (, )][DBLP]


  53. Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. [Citation Graph (, )][DBLP]


  54. How Bad is Suboptimal Rate Allocation? [Citation Graph (, )][DBLP]


  55. NoHype: virtualized cloud infrastructure without the virtualization. [Citation Graph (, )][DBLP]


  56. The Reduced Address Space (RAS) for Application Memory Authentication. [Citation Graph (, )][DBLP]


  57. Hardware-Assisted Application-Level Access Control. [Citation Graph (, )][DBLP]


  58. A novel cache architecture with enhanced performance and security. [Citation Graph (, )][DBLP]


  59. Accountability in hosted virtual networks. [Citation Graph (, )][DBLP]


  60. Secure Key Management Architecture Against Sensor-Node Fabrication Attacks. [Citation Graph (, )][DBLP]


  61. Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  62. Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. [Citation Graph (, )][DBLP]


  63. Forward-Secure Content Distribution to Reconfigurable Hardware. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002