Authentication Control Point and Its Implications For Secure Processor Design. Shi, W. & Lee, H. In 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06), pages 103-112, 12, 2006. IEEE. Paper Website bibtex @inProceedings{
title = {Authentication Control Point and Its Implications For Secure Processor Design},
type = {inProceedings},
year = {2006},
identifiers = {[object Object]},
keywords = {Authentication,Computer architecture,Cryptography,Mobile agents,Out of order,Physics computing,Privacy,Process design,Protection,Security,authentication control,computer architecture,cryptography,data privacy,message authentication,secure computing environment,secure processor architecture,secure processor design,software encryption,software privacy},
pages = {103-112},
websites = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4041839},
month = {12},
publisher = {IEEE},
id = {383a5ec7-cd8b-37e1-9c34-cd6c88ca361f},
created = {2016-04-07T10:34:34.000Z},
accessed = {2016-03-31},
file_attached = {true},
profile_id = {f1db73c3-239d-36d4-8bb0-bab363f5c6ac},
group_id = {43f2be07-c028-3da9-a55e-4f12e16d4053},
last_modified = {2016-04-07T10:34:34.000Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {false},
hidden = {false},
bibtype = {inProceedings},
author = {Shi, Weidong and Lee, Hsien¿hsin},
booktitle = {2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06)}
}
Downloads: 0
{"_id":"XH76v8xDKDnCptYef","bibbaseid":"shi-lee-authenticationcontrolpointanditsimplicationsforsecureprocessordesign-2006","downloads":0,"creationDate":"2016-04-07T10:31:54.152Z","title":"Authentication Control Point and Its Implications For Secure Processor Design","author_short":["Shi, W.","Lee, H."],"year":2006,"bibtype":"inProceedings","biburl":null,"bibdata":{"title":"Authentication Control Point and Its Implications For Secure Processor Design","type":"inProceedings","year":"2006","identifiers":"[object Object]","keywords":"Authentication,Computer architecture,Cryptography,Mobile agents,Out of order,Physics computing,Privacy,Process design,Protection,Security,authentication control,computer architecture,cryptography,data privacy,message authentication,secure computing environment,secure processor architecture,secure processor design,software encryption,software privacy","pages":"103-112","websites":"http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4041839","month":"12","publisher":"IEEE","id":"383a5ec7-cd8b-37e1-9c34-cd6c88ca361f","created":"2016-04-07T10:34:34.000Z","accessed":"2016-03-31","file_attached":"true","profile_id":"f1db73c3-239d-36d4-8bb0-bab363f5c6ac","group_id":"43f2be07-c028-3da9-a55e-4f12e16d4053","last_modified":"2016-04-07T10:34:34.000Z","read":false,"starred":false,"authored":false,"confirmed":false,"hidden":false,"bibtype":"inProceedings","author":"Shi, Weidong and Lee, Hsien¿hsin","booktitle":"2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06)","bibtex":"@inProceedings{\n title = {Authentication Control Point and Its Implications For Secure Processor Design},\n type = {inProceedings},\n year = {2006},\n identifiers = {[object Object]},\n keywords = {Authentication,Computer architecture,Cryptography,Mobile agents,Out of order,Physics computing,Privacy,Process design,Protection,Security,authentication control,computer architecture,cryptography,data privacy,message authentication,secure computing environment,secure processor architecture,secure processor design,software encryption,software privacy},\n pages = {103-112},\n websites = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4041839},\n month = {12},\n publisher = {IEEE},\n id = {383a5ec7-cd8b-37e1-9c34-cd6c88ca361f},\n created = {2016-04-07T10:34:34.000Z},\n accessed = {2016-03-31},\n file_attached = {true},\n profile_id = {f1db73c3-239d-36d4-8bb0-bab363f5c6ac},\n group_id = {43f2be07-c028-3da9-a55e-4f12e16d4053},\n last_modified = {2016-04-07T10:34:34.000Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {false},\n hidden = {false},\n bibtype = {inProceedings},\n author = {Shi, Weidong and Lee, Hsien¿hsin},\n booktitle = {2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06)}\n}","author_short":["Shi, W.","Lee, H."],"urls":{"Paper":"http://bibbase.org/service/mendeley/f1db73c3-239d-36d4-8bb0-bab363f5c6ac/file/4c7bc04a-ffa7-05eb-0eb5-d13da3da448e/2006-Authentication_Control_Point_and_Its_Implications_For_Secure_Processor_Design.pdf.pdf","Website":"http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4041839"},"bibbaseid":"shi-lee-authenticationcontrolpointanditsimplicationsforsecureprocessordesign-2006","role":"author","keyword":["Authentication","Computer architecture","Cryptography","Mobile agents","Out of order","Physics computing","Privacy","Process design","Protection","Security","authentication control","computer architecture","cryptography","data privacy","message authentication","secure computing environment","secure processor architecture","secure processor design","software encryption","software privacy"],"downloads":0},"search_terms":["authentication","control","point","implications","secure","processor","design","shi","lee"],"keywords":["authentication","computer architecture","cryptography","mobile agents","out of order","physics computing","privacy","process design","protection","security","authentication control","computer architecture","cryptography","data privacy","message authentication","secure computing environment","secure processor architecture","secure processor design","software encryption","software privacy"],"authorIDs":[]}