Search Results - "Bu, Lake"
-
1
Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing
Published in IEEE transactions on computers (01-08-2016)“…Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. The security of the unprotected sharing scheme, however,…”
Get full text
Journal Article -
2
Crosstalk Free Coding Systems to Protect NoC Channels against Crosstalk Faults
Published in 2017 IEEE International Conference on Computer Design (ICCD) (01-11-2017)“…Reliability of modern multicore and many-core chips is tightly coupled with the reliability of their on-chip networks. Communication channels in current…”
Get full text
Conference Proceeding -
3
Designing Secure Heterogeneous Multicore Systems from Untrusted Components
Published in Cryptography (01-09-2018)“…In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cores, may come from different providers, and executable code…”
Get full text
Journal Article -
4
A secure and robust scheme for sharing confidential information in IoT systems
Published in Ad hoc networks (01-09-2019)“…In Internet of Things (IoT) systems with security demands, there is often a need to distribute sensitive information (such as encryption keys, digital…”
Get full text
Journal Article -
5
A Secure and Robust Scheme for Sharing Confidential Information in IoT Systems
Published 27-11-2019“…Ad Hoc Networks, vol. 92, 2019 - Special Issue on Security of IoT-enabled Infrastructures in Smart Cities In Internet of Things (IoT) systems with security…”
Get full text
Journal Article -
6
A hybrid self-diagnosis mechanism with defective nodes locating and attack detection for parallel computing systems
Published in 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS) (01-07-2016)“…In recent years parallel computing has been widely employed for both science research and commercial applications. For parallel systems such as many-core or…”
Get full text
Conference Proceeding -
7
New byte error correcting codes with simple decoding for reliable cache design
Published in 2015 IEEE 21st International On-Line Testing Symposium (IOLTS) (01-07-2015)“…Most cache designs support single or double bit-level error detection and correction in cache lines. However, a single error may distort a whole byte or even…”
Get full text
Conference Proceeding -
8
Bulwark: Securing implantable medical devices communication channels
Published in Computers & security (01-09-2019)“…•This work introduces a design of secure wireless transmission channel for implantable medical devices (IMDs).•The proposed technique is able to protect the…”
Get full text
Journal Article -
9
RASSS: a hijack‐resistant confidential information management scheme for distributed systems
Published in Chronic diseases and translational medicine (01-05-2019)“…In distributed systems there is often a need to store and share sensitive information (e.g., encryption keys, digital signatures, login credentials etc.) among…”
Get full text
Journal Article -
10
Design of Secure and Trustworthy System-on-chip Architectures Using Hardware-based Root-of-trust Techniques
Published 01-01-2019“…Cyber-security is now a critical concern in a wide range of embedded computing modules, communications systems, and connected devices. These devices are used…”
Get full text
Dissertation -
11
Quantum-Proof Lightweight McEliece Cryptosystem Co-processor Design
Published in 2020 IEEE 38th International Conference on Computer Design (ICCD) (01-10-2020)“…Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction…”
Get full text
Conference Proceeding -
12
Adaptive and Dynamic Device Authentication Using Lorenz Chaotic Systems
Published in 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS) (01-08-2018)“…Chaotic systems such as Lorenz functions have been proposed as cryptographic primitives due to their short-range divergence attributes. They are commonly used…”
Get full text
Conference Proceeding -
13
Design of reliable storage and compute systems with lightweight group testing based non‐binary error correction codes
Published in Chronic diseases and translational medicine (01-05-2019)“…In this study, the authors propose a new group testing based (GTB) error control codes (ECCs) approach for improving the reliability of memory structures in…”
Get full text
Journal Article -
14
Fast Dynamic Device Authentication Based on Lorenz Chaotic Systems
Published in 2018 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) (01-10-2018)“…Chaotic systems, such as Lorenz systems or logistic functions, are known for their rapid divergence property. Even the smallest change in the initial condition…”
Get full text
Conference Proceeding -
15
Design-flow Methodology for Secure Group Anonymous Authentication
Published in 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01-03-2020)“…In heterogeneous distributed systems, computing devices and software components often come from different providers and have different security, trust, and…”
Get full text
Conference Proceeding -
16
RASSS: A perfidy-aware protocol for designing trustworthy distributed systems
Published in 2017 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) (01-10-2017)“…Robust Adaptive Secure Secret Sharing (RASSS) is a protocol for reconstructing secrets and information in distributed computing systems even in the presence of…”
Get full text
Conference Proceeding -
17
SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems
Published in Journal of hardware and systems security (01-09-2019)“…Although there is a pressing need for highly secure and reliable computing systems, there is a glaring lack of formalism under which the properties of…”
Get full text
Journal Article -
18
A Post-Quantum Secure Discrete Gaussian Noise Sampler
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…While the notion of achieving "quantum supremacy" may be debatable, rapid developments in the field of quantum computing are heading towards more realistic…”
Get full text
Conference Proceeding -
19
Open-Source FPGA Implementation of Post-Quantum Cryptographic Hardware Primitives
Published in 2019 29th International Conference on Field Programmable Logic and Applications (FPL) (01-09-2019)“…The following topics are dealt with: field programmable gate arrays; learning (artificial intelligence); convolutional neural nets; logic design;…”
Get full text
Conference Proceeding -
20
Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators
Published in 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (01-12-2018)“…Machine learning (ML) models are often trained using private datasets that are very expensive to collect, or highly sensitive, using large amounts of computing…”
Get full text
Conference Proceeding