• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1980 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2010

    General-purpose FPGA platform for efficient encryption and hashing

    Szefer, J., Chen, Y. Y. & Lee, R. B-L., Aug 27 2010, ASAP 10 - 21st IEEE International Conference on Application-Specific Systems, Architectures and Processors, Conference Proceedings. p. 309-312 4 p. 5540976. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • NoHype: Virtualized cloud infrastructure without the virtualization

    Keller, E., Szefer, J., Rexford, J. L. & Lee, R. B-L., 2010, ISCA 2010 - The 37th Annual International Symposium on Computer Architecture, Conference Proceedings. p. 350-361 12 p. (Proceedings - International Symposium on Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    179 Scopus citations
  • Processor accelerator for AES

    Lee, R. B. & Chen, Y. Y., Aug 24 2010, Proceedings of the 2010 IEEE 8th Symposium on Application Specific Processors, SASP'10. p. 16-21 6 p. 5521153. (Proceedings of the 2010 IEEE 8th Symposium on Application Specific Processors, SASP'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Scalable architectural support for trusted software

    Champagne, D. & Lee, R. B., 2010, HPCA-16 2010 - The 16th International Symposium on High-Performance Computer Architecture. IEEE Computer Society, 5416657. (Proceedings - International Symposium on High-Performance Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    106 Scopus citations
  • 2009

    Accountability in hosted virtual networks

    Keller, E., Lee, R. B-L. & Rexford, J. L., Aug 17 2009, SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, VISA 2009. Association for Computing Machinery, Inc, p. 29-35 7 p. (SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, VISA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations
  • Hardware-assisted application-level access control

    Chen, Y. Y. & Lee, R. B., 2009, Information Security - 12th International Conference, ISC 2009, Proceedings. p. 363-378 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5735 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Hardware mechanisms for memory authentication: A survey of existing techniques and engines

    Elbaz, R., Champagne, D., Gebotys, C., Lee, R. B., Potlapally, N. & Torres, L., 2009, Transactions on Computational Science IV: Special Issue on Security in Computing. p. 1-22 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    56 Scopus citations
  • Multi-path key establishment against REM attacks in wireless ad hoc networks

    Lan, T., Lee, R. & Chiang, M., 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5426213. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Securing the dissemination of emergency response data with an integrated hardware-software architecture

    Levin, T. E., Dwoskin, J. S., Bhaskara, G., Nguyen, T. D., Clark, P. C., Lee, R. B-L., Irvine, C. E. & Benzel, T. V., Nov 9 2009, Trusted Computing - Second International Conference, Trust 2009, Proceedings. p. 133-152 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5471 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Tuning instruction customisation for reconfigurable system-on-chip

    Ho, C. H., Luk, W., Szefer, J. M. & Lee, R. B-L., Dec 1 2009, Proceedings - IEEE International SOC Conference, SOCC 2009. p. 61-64 4 p. 5398096. (Proceedings - IEEE International SOC Conference, SOCC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2008

    Accelerating the Whirlpool Hash Function using parallel table lookup and fast cyclical permutation

    Hilewitz, Y., Yin, Y. L. & Lee, R. B., Sep 1 2008, Fast Software Encryption - 15th International Workshop, FSE 2008, Revised Selected Papers. p. 173-188 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5086 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • A novel cache architecture with enhanced performance and security

    Wang, Z. & Lee, R. B., 2008, 2008 Proceedings of the 41st Annual IEEE/ACM International Symposium on Microarchitecture, MICRO-41. 2008 PROCEEDINGS ed. p. 83-93 11 p. 4771781. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO; no. 2008 PROCEEDINGS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    167 Scopus citations
  • Bit matrix multiplication in commodity processors

    Hilewitz, Y., Lauradoux, C. & Lee, R. B., Sep 18 2008, ASAP08, Conference Proceedings - IEEE 19th International Conference on Application-Specific Systems, Architectures and Processors. p. 7-12 6 p. 4580146. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Forward-secure content distribution to reconfigurable hardware

    Champagne, D., Elbaz, R., Gebotys, C., Torres, L. & Lee, R. B., 2008, Proceedings - 2008 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2008. p. 450-455 6 p. 4731836. (Proceedings - 2008 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • How bad is suboptimal rate allocation?

    Lan, T., Lin, X., Chiang, M. & Lee, R., 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 951-959 9 p. 4509668. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • The Reduced Address Space (RAS) for application memory authentication

    Champagne, D., Elbaz, R. & Lee, R. B., Nov 28 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 47-63 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2007

    Architecture for a non-copyable disk (NCdisk) using a Secret-Protection (SP) SoC solution

    Wang, M. S. & Ruby, B. L., 2007, Conference Record of the 41st Asilomar Conference on Signals, Systems and Computers, ACSSC. p. 1999-2003 5 p. 4487587. (Conference Record - Asilomar Conference on Signals, Systems and Computers).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Hardware-rooted trust for secure key management and transient trust

    Dwoskin, J. S. & Lee, R. B-L., Dec 1 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 389-400 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    59 Scopus citations
  • Mutual anonymous communications: A new covert channel based on splitting tree MAC

    Zhenghong, W., Jing, D. & Lee, R. B., 2007, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications. p. 2531-2535 5 p. 4215897. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • New cache designs for thwarting software cache-based side channel attacks

    Wang, Z. & Lee, R. B-L., Oct 22 2007, ISCA'07: 34th Annual International Symposium on Computer Architecture, Conference Proceedings. p. 494-505 12 p. (Proceedings - International Symposium on Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    320 Scopus citations
  • Performing advanced bit manipulations efficiently in general-purpose processors

    Hilewitz, Y. & Lee, R. B., 2007, Proceedings - 18th IEEE Symposium on Computer Arithmetic, ARITH 18. p. 251-260 10 p. 4272872. (Proceedings - Symposium on Computer Arithmetic).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Secure key management architecture against sensor-node fabrication attacks

    Dwoskin, J., Xu, D., Huang, J., Chiang, M. & Lee, R., 2007, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings. p. 166-171 6 p. 4410949. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • TEC-tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks

    Elbaz, R., Champagne, D., Lee, R. B., Torres, L., Sassatelli, G. & Guillemin, P., 2007, Cryptographic Hardware and Embedded Systems - CHES 2007 - 9th International Workshop, Proceedings. Springer Verlag, p. 289-302 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4727 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    31 Scopus citations
  • 2006

    Covert and side channels due to processor architecture

    Wang, Z. & Lee, R. B., 2006, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 473-482 10 p. 4041191. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    176 Scopus citations
  • Fast bit compression and expansion with parallel extract and parallel deposit instructions

    Hilewitz, Y. & Lee, R. B., 2006, Proceedings - IEEE 17th International Conference on Application-specific Systems, Architectures and Processors, ASAP 2006. p. 65-70 6 p. 4019493. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Impact of configurability and extensibility on IPSec protocol execution on embedded processors

    Potlapally, N. R., Ravi, S., Raghunalhan, A., Lee, R. B. & Jha, N. K., Sep 18 2006, Proceedings - 19th International Conference on VLSI Design held jointly with 5th International Conference on Embedded Systems Design. p. 299-304 6 p. 1581468. (Proceedings of the IEEE International Conference on VLSI Design; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Memory access optimization of motion estimation algorithms on a native SIMD PLX processor

    Lin, G. H., Chen, S. J., Lee, R. B-L. & Hu, Y. H., Dec 1 2006, APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems. p. 566-569 4 p. 4145456. (IEEE Asia-Pacific Conference on Circuits and Systems, Proceedings, APCCAS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2005

    Fast parallel table lookups to accelerate symmetric-key cryptography

    Fiskiran, A. M. & Lee, R. B-L., Sep 21 2005, Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing. Selvaraj, H. & Srimani, P. K. (eds.). p. 526-531 6 p. (International Conference on Information Technology: Coding and Computing, ITCC; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • New constructive approach to covert channel modeling and channel capacity estimation

    Wang, Z. & Lee, R. B., 2005, Information Security - 8th International Conference, ISC 2005, Proceedings. Springer Verlag, p. 498-505 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3650 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • On-chip lookup tables for fast symmetric-key encryption

    Fiskiran, A. M. & Lee, R. B., 2005, Proceedings - 16th International Conference on Application-Specific Systems, Architectures, and Processors. p. 356-363 8 p. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Scopus citations
  • Processor architecture for trustworthy computers

    Lee, R. B., 2005, Advances in Computer Systems Architecture - 10th Asia-Pacific Conference, ACSAC 2005, Proceedings. Springer Verlag, p. 1-2 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3740 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2004

    On permutation operations in cipher design

    Lee, R. B., Shi, Z. J., Yin, Y. L., Rivest, R. L. & Robshaw, M. J. B., 2004, International Conference on Information Technology: Coding Computing, ITCC 2004. Srimani, P. K., Abraham, A., Cannataro, M., Domingo-Ferrer, J. & Hashemi, R. (eds.). p. 569-577 9 p. (International Conference on Information Technology: Coding Computing, ITCC; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • PLX FP: An efficient floating-point instruction set for 3D graphics

    Yang, X. & Lee, R. B-L., Dec 1 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME). p. 137-140 4 p. (2004 IEEE International Conference on Multimedia and Expo (ICME); vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Runtime Execution Monitoring (REM) to detect and prevent malicious code execution

    Fiskiran, A. M. & Lee, R. B., Dec 1 2004, Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors, ICCD 2004. p. 452-457 6 p. (Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • 2003

    Adding 3D graphics support to PLX

    Yang, X. & Lee, R., Dec 1 2003, Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education. p. 40-44 5 p. 1270568. (Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • A processor architecture defense against buffer overflow attacks

    McGregor, J. P., Karig, D. K., Shi, Z. & Lee, R. B., 2003, Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education. p. 243-250 8 p. 1270612. (Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    49 Scopus citations
  • Arbitrary bit permutations in one or two cycles

    Shi, Z., Yang, X. & Lee, R. B., 2003, Proceedings - IEEE International Conference on Application-Specific Systems, Architectures, and Processors, ASAP 2003. Deprettere, E., Bhattacharyya, S., Thiele, L., Cavallaro, J. & Darte, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 237-247 11 p. 1212847. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • 2002

    PLX: A fully subword-parallel instruction set architecture for fast scalable multimedia processing

    Lee, R. B. & Murat Fiskiran, A., 2002, Proceedings - 2002 IEEE International Conference on Multimedia and Expo, ICME 2002. Institute of Electrical and Electronics Engineers Inc., p. 117-120 4 p. 1035526. (Proceedings - 2002 IEEE International Conference on Multimedia and Expo, ICME 2002; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • Refining instruction set architecture for high-performance multimedia processing in constrained environments

    Lee, R. B., Fiskiran, A. M., Shi, Z. & Yang, X., 2002, Proceedings - IEEE International Conference on Application-Specific Systems, Architectures, and Processors, ASAP 2002. Schreiber, R., Bhattacharyya, S., Burgess, N. & Schulte, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 253-264 12 p. 1030724. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors; vol. 2002-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments

    Murat Fiskiran, A. & Lee, R. B., 2002, 2002 IEEE International Workshop on Workload Characterization, WWC 2002. Institute of Electrical and Electronics Engineers Inc., p. 127-137 11 p. 1226501. (2002 IEEE International Workshop on Workload Characterization, WWC 2002).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • 2001

    Computer arithmetic - A processor architect's perspective

    Lee, R. B-L., Jan 1 2001, Proceedings - Symposium on Computer Arithmetic. p. 3-4 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2000

    Bit permutation instructions for accelerating software cryptography

    Shi, Z. & Lee, R. B-L., Dec 3 2000, Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors. p. 138-148 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    100 Scopus citations
  • Subword permutation instructions for two-dimensional multimedia processing in MicroSIMD architectures

    Lee, R. B-L., Jan 1 2000, Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors. IEEE, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • 1997

    Multimedia extensions for general-purpose processors

    Lee, R. B-L., Dec 1 1997, IEEE Workshop on Signal Processing Systems, SiPS: Design and Implementation. IEEE, p. 9-23 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    72 Scopus citations
  • Performance enhancement of El.263 encoder based on zero coefficient prediction

    Yu, A., Lee, R. & Flynn, M., Nov 1 1997, Proceedings of the 5th ACM International Conference on Multimedia, MULTIMEDIA 1997. Association for Computing Machinery, Inc, p. 21-29 9 p. (Proceedings of the 5th ACM International Conference on Multimedia, MULTIMEDIA 1997).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1996

    Improving performance for software MPEG players

    Zucker, D. F., Flynn, M. J. & Lee, R. B., 1996, Digest of Papers - COMPCON - IEEE Computer Society International Conference. p. 327-332 6 p. (Digest of Papers - COMPCON - IEEE Computer Society International Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 1995

    Realtime MPEG video via software decompression on a PA-RISC processor

    Lee, R. B., Jan 1 1995, Digest of Papers - COMPCON 1995: Technologies for the Information Superhighway. Institute of Electrical and Electronics Engineers Inc., p. 186-192 7 p. 512384. (Digest of Papers - COMPCON 1995: Technologies for the Information Superhighway).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • 1993

    HP's PA7100LC: a low-cost superscalar PA-RISC processor

    Knebel, P., Arnold, B., Bass, M., Kever, W., Lamb, J. D., Lee, R. B., Perez, P. L., Undy, S. & Walker, W., Jan 1 1993, 1993 IEEE Compcon Spring. Publ by IEEE, p. 441-447 7 p. (1993 IEEE Compcon Spring).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Pathlengths of SPEC bencmarks for PA-RISC, MIPS, and SPARC

    McMahan, L. & Lee, R., Jan 1 1993, 1993 IEEE Compcon Spring. Publ by IEEE, p. 481-490 10 p. (1993 IEEE Compcon Spring).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • 1992

    Pathlength reduction features in the PA-RISC architecture

    Lee, R., Mahon, M. & Morris, D., Feb 1 1992, Digest of Papers - IEEE Computer Society International Conference. Publ by IEEE, p. 129-135 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations