Author |
Title |
Defense Date |
William Thomson |
Cryptographic Hardware Security, Implementations and Protective
Measures (abstract) |
Dec. 2005 |
Saadat A. Khan |
Standard Cell Based ASIC Library Development Flow (abstract) |
Dec. 2005 |
Mateo Mejia-Tellez |
Design and Implementation of Ternary Logic Circuits in CMOS
Technology (abstract) |
Dec. 2005 |
Jamie Bernard |
Physical Level Design using Synopsys (abstract) |
Nov. 2005 |
Cory Ellinger |
VLSI Design Automation (abstract) |
Aug. 2005 |
Mehul Revankar |
Security Infrastructure Management Systems and Open Source Tools
(abstract) |
Aug. 2005 |
Ranjeeta Patil |
Hardware-Software Co-design using Xilinx FPGAs (abstract) |
Aug. 2005 |
Pipat Songkaitisak |
Smart Card Security (abstract) |
May 2005 |
Nandakishore Sastry |
High-Level Synthesis: Languages, Tools, Methodologies and Case
study on SRC- 6E reconfigurable computer (abstract) |
May 2005 |
Author |
Title |
Defense Date |
Waheed Qureshi |
Past, Presence and Future of Public Key Infrastructure (PKI)
(abstract) |
Dec. 2003 |
Devin Bayles |
Radiation Hardened Library Design: Challenges
and Considerations (abstract) |
Dec. 2003 |
Shylaja Morisetty |
Security In Handheld Devices (abstract) |
Dec. 2003 |
Prathibha Kuppala |
Working of Transport Layer Security and Kerberos-V5 and how
these are applied to Robust Security Network (RSN) (abstract) |
Dec. 2003 |
Poornima Sarvadevabhatla |
Reconfigurable Computing Tools (abstract) |
Dec. 2003 |
Rajesh Chintala |
Storage Area Networks, Their Architectures and Benefits (abstracts) |
Dec. 2003 |
Rama Donthireddy |
Analysis of Security Evaluation Methods with a
Case Study on FIPS 140-2 Evaluation (abstract) |
|
Varun Aggarwal |
Performance Evaluation of Secure Routing Protocol for Ad
Hoc Networks (abstract) |
Aug. 2003 |
Lakshmi Gayathri Bayyavarapu |
Survey of Security Risks and Challenges in RFID Systems (abstract) |
Aug. 2003 |
Author |
Title |
Defense Date |
Himabindu Sajja |
AES ASIC to FPGA porting (abstract) |
Dec. 2002 |
Deepak Somesula |
Survey of Different Hardware Architectures for RSA
(abstract) |
Dec. 2002 |
Nandgopal Cherukuru |
Routing Protocols for Ad Hoc Networks and their Security
(abstract) |
Dec. 2002 |
Prakairat Moon |
Secure Ad Hoc Networks (abstract) |
Nov. 2002 |
Vasant Patel |
Next Generation IP Protocol (IPv6) (abstract) |
Aug. 2002 |
Paul E. LaFond |
Public Key Infrastructure: Past, Present, & Future |
May 2002 |
Viswanadham Sanku |
Emerging public key cryptosystems (ECC, NTRU, HFE) and their
security (abstract) |
May 2002 |
Xiaofang F. Yuan |
Survey of PKI Used in the U.S. Federal Government
(abstract) |
May 2002 |
Prem R. Vemuganti |
Security in Wireless Communications: IEEE 802.11 and Bluetooth
(abstract) |
May 2002 |
Soonyong Sohn |
Analysis of Denial of Service Attack (abstract) |
Apr. 2002 |
Poonam Arora |
Overview of Digital Subscriber Line Technology (abstract) |
Apr. 2002 |
Tom Lash |
Power Analysis in Rijndael, the Advanced Encryption Standard
(abstract) |
Feb. 2002 |