Shenglin Yang

According to our database1, Shenglin Yang authored at least 12 papers between 2003 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2012
A Service Level Agreement for the Resource Transaction Risk Based on Cloud Bank Model.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2007
Secure IRIS Verification.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
Multilevel Design Validation in a Secure Embedded System.
IEEE Trans. Computers, 2006

Efficient and Secure Fingerprint Verification for Embedded Devices.
EURASIP J. Adv. Sig. Proc., 2006

2005
Automatic secure fingerprint verification system based on fuzzy vault scheme.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Multilevel design validation in a secure embedded system.
Proceedings of the Tenth IEEE International High-Level Design Validation and Test Workshop 2005, Napa Valley, CA, USA, November 30, 2005

A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing.
Proceedings of the 42nd Design Automation Conference, 2005

Microcoded coprocessor for embedded secure biometric authentication systems.
Proceedings of the 3rd IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, 2005

Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
A realtime, memory efficient fingerprint verification system.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2003
Testing ThumbPod: Softcore bugs are hard to find.
Proceedings of the Eighth IEEE International High-Level Design Validation and Test Workshop 2003, 2003

Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system.
Proceedings of the 40th Design Automation Conference, 2003


  Loading...