Author:
Lombardi Flavio,Pietro Roberto Di
Reference44 articles.
1. Agosta G, Barenghi A, Santis FD, Biagio AD, Pelosi G (2009) Fast disk encryption through GPGPU acceleration. In: Proceedings of the 2009 international conference on parallel and distributed computing, applications and technologies. Washington, DC, IEEE Computer Society, pp 102–109
2. AMD (2012) HSA—what is heterogeneous system architecture.
http://developer.amd.com/resources/heterogeneous-computing/what-is-heterogeneous-system-architecture-hsa/
. Accessed 06 May 2014
3. Barenghi A, Pelosi G, Teglia Y (2011) Information leakage discovery techniques to enhance secure chip design. In: Ardagna C, Zhou J (eds) Information security theory and practice. Security and privacy of mobile devices in wireless communication, vol 6633. Springer, Berlin, pp 128–143
4. Black N, Rodzik J (2010) My other computer is your GPU: System-centric CUDA threat modeling with CUBAR.
http://dank.qemfd.net/dankwiki/images/d/d2/Cubar2010.pdf
. Accessed 12 May 2014
5. Chafik O (2011) JavaCL OpenCL bindings for Java.
http://code.google.com/p/javacl/
. Accessed 06 May 2014
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献