Algorithms and Architectures for Parallel Processing
暂无分享,去创建一个
[1] Jingling Xue,et al. Contention-Aware Scheduling for Asymmetric Multicore Processors , 2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS).
[2] Rami G. Melhem,et al. On the Interplay of Parallelization, Program Performance, and Energy Consumption , 2010, IEEE Transactions on Parallel and Distributed Systems.
[3] Tatsuaki Okamoto,et al. Leakage resilient eCK-secure key exchange protocol without random oracles , 2011, ASIACCS '11.
[4] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[5] Ruhul Amin,et al. Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card , 2015 .
[6] Zheng Yang,et al. On security analysis of an after-the-fact leakage resilient key exchange protocol , 2016, Inf. Process. Lett..
[7] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[8] Sandeep Kumar Sood. Dynamic Resource Provisioning in Cloud based on Queuing Model , 2013, CloudCom 2013.
[9] Debiao He,et al. Efficient provably secure password-based explicit authenticated key agreement , 2015, Pervasive Mob. Comput..
[10] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[11] Linwei Niu,et al. Reducing both dynamic and leakage energy consumption for hard real-time systems , 2004, CASES '04.
[12] Liehuang Zhu,et al. Scalable protocol for cross-domain group password-based authenticated key exchange , 2014, Frontiers of Computer Science.
[13] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] Simon Holmbacka,et al. Energy efficiency and performance management of parallel dataflow applications , 2014, Proceedings of the 2014 Conference on Design and Architectures for Signal and Image Processing.
[15] Marco D. Santambrogio,et al. Workload-aware power optimization strategy for asymmetric multiprocessors , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[16] Ran Canetti,et al. Efficient Password Authenticated Key Exchange via Oblivious Transfer , 2012, Public Key Cryptography.
[17] Simon Holmbacka,et al. Energy-Awareness and Performance Management with Parallel Dataflow Applications , 2017, J. Signal Process. Syst..
[18] Yann-Hang Lee,et al. Scheduling techniques for reducing leakage power in hard real-time systems , 2003, 15th Euromicro Conference on Real-Time Systems, 2003. Proceedings..
[19] P Priyanka,et al. ID2S Password-Authenticated Key Exchange Protocols , 2017 .
[20] Jean-Marc Pierson,et al. Towards a generic power estimator , 2014, Computer Science - Research and Development.
[21] Sarvar Patel,et al. Password-authenticated key exchange based on RSA , 2000, International Journal of Information Security.
[22] Colin Boyd,et al. Continuous After-the-Fact Leakage-Resilient Key Exchange , 2014, ACISP.
[23] James W. Layland,et al. Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment , 1989, JACM.
[24] Mingwu Zhang,et al. After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange , 2018, IEEE Systems Journal.
[25] Dong Hoon Lee,et al. EC2C-PAKA: An efficient client-to-client password-authenticated key agreement , 2007, Inf. Sci..
[26] Hao Shen,et al. Learning based DVFS for simultaneous temperature, performance and energy management , 2012, Thirteenth International Symposium on Quality Electronic Design (ISQED).
[27] Mahmoud Ahmadian-Attari,et al. An efficient client–client password-based authentication scheme with provable security , 2014, The Journal of Supercomputing.
[28] Hugo Krawczyk,et al. On Extract-then-Expand Key Derivation Functions and an HMAC-based KDF ∗ , 2008 .
[29] Sascha Uhrig,et al. Dynamic Workload Prediction for Soft Real-Time Applications , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[30] Bronis R. de Supinski,et al. Adagio: making DVS practical for complex HPC applications , 2009, ICS.
[31] Tao Wang,et al. Improving timing attack on RSA-CRT via error detection and correction strategy , 2013, Inf. Sci..
[32] Rizos Sakellariou,et al. Performance-Based Pricing in Multi-Core Geo-Distributed Cloud Computing , 2020, IEEE Transactions on Cloud Computing.
[33] SK Hafizul Islam,et al. Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps , 2015, Inf. Sci..
[34] Fatima Oumellal,et al. MMPP/G/m/m+r Queuing System Model to Analytically Evaluate Cloud Computing Center Performances , 2014 .
[35] Chung-Fu Lu,et al. Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preservation for Mobile Environment , 2015, KSII Trans. Internet Inf. Syst..
[36] Fuchun Guo,et al. Strongly Leakage-Resilient Authenticated Key Exchange , 2016, CT-RSA.
[37] Yehuda Lindell,et al. Session-Key Generation Using Human Passwords Only , 2001, Journal of Cryptology.
[38] Douglas Stebila,et al. Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange , 2015, IMACC.
[39] Stefanos Kaxiras,et al. Green governors: A framework for Continuously Adaptive DVFS , 2011, 2011 International Green Computing Conference and Workshops.
[40] Jaehyuk Huh,et al. Big or Little: A Study of Mobile Interactive Applications on an Asymmetric Multi-core Platform , 2015, 2015 IEEE International Symposium on Workload Characterization.
[41] Stefan Dziembowski,et al. Leakage-Resilient Storage , 2010, SCN.
[42] Umesh Bellur,et al. CPU Frequency Tuning to Improve Energy Efficiency of MapReduce Systems , 2016, 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS).
[43] Colin Boyd,et al. Modelling after-the-fact leakage for key exchange , 2014, IACR Cryptol. ePrint Arch..
[44] Rajesh K. Gupta,et al. Procrastination scheduling in fixed priority real-time systems , 2004, LCTES '04.
[45] Kai Chen,et al. Improving Energy Efficiency of Web Servers by Using a Load Distribution Algorithm and Shutting Down Idle Nodes , 2015, 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[46] Rafail Ostrovsky,et al. Efficient and secure authenticated key exchange using weak passwords , 2009, JACM.
[47] Jason M. Allred,et al. Long term sustainability of differentially reliable systems in the dark silicon era , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).
[48] Henry Hoffmann,et al. Racing and Pacing to Idle: Theoretical and Empirical Analysis of Energy Optimization Heuristics , 2015, 2015 IEEE 3rd International Conference on Cyber-Physical Systems, Networks, and Applications.
[49] Simon Holmbacka,et al. Accurate energy modeling for many-core static schedules with streaming applications , 2016, Microprocess. Microsystems.
[50] Jose Renau,et al. Characterizing processor thermal behavior , 2010, ASPLOS XV.
[51] Stefan M. Petters,et al. Enhanced Race-To-Halt: A Leakage-Aware Energy Management Approach for Dynamic Priority Systems , 2011, 2011 23rd Euromicro Conference on Real-Time Systems.
[52] Dongho Won,et al. Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group , 2011, HCI.
[53] Jonathan Katz,et al. Two-server password-only authenticated key exchange , 2005, J. Comput. Syst. Sci..
[54] Mahmut T. Kandemir,et al. Leakage Current: Moore's Law Meets Static Power , 2003, Computer.
[55] Vipul Goyal. Positive Results for Concurrently Secure Computation in the Plain Model , 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.
[56] Stefan Dziembowski,et al. Leakage-Resilient Cryptography From the Inner-Product Extractor , 2011, IACR Cryptol. ePrint Arch..
[57] N.Ani Brown Mary,et al. Performance Factors of Cloud Computing Data Centers Using [(M/G/1) : (∞/Gdmodel)] Queuing Systems , 2013 .
[58] Yellow Zone. Race to Idle or Not: Balancing the Memory Sleep Time with DVS for Energy Minimization , 2015 .