Follow
Marcio Juliato
Title
Cited by
Cited by
Year
V2X communications using multiple radio access technologies (multi-RAT)
S Fechtel, KPA Roth, B Gunzelmann, MD Mueck, I Karls, Z Yu, T Clevorn, ...
US Patent 11,304,037, 2022
672022
Intrusion Detection System for In-Vehicle Networks using Sensor Correlation and Integration
H Li, L Zhao, M Juliato, S Ahmed, MR Sastry, LL Yang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
372017
FPGA Implementation of an HMAC Processor based on the SHA-2 Family of Hash Functions
M Juliato, C Gebotys
CACR Technical Report, 2011
342011
A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security
M Juliato, C Gebotys
IEEE Transactions on Aerospace and Electronic Systems 49 (3), 1536-1554, 2013
222013
Efficient Fault Tolerant SHA-2 Hash Functions for Space Applications
M Juliato, C Gebotys, R Elbaz
2009 IEEE Aerospace Conference (Aeroconf'09), 1-16, 2009
192009
Efficient Fault Tolerant SHA-2 Hash Functions for Space Applications
M Juliato, C Gebotys, R Elbaz
CACR Technical Report, 2009
192009
SEU-Resistant SHA-256 Design for Security in Satellites
M Juliato, C Gebotys
10th International Workshop on Signal Processing for Space Communications …, 2008
172008
Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals
M Juliato, C Gebotys
2009 International Conference on Reconfigurable Computing and FPGAs …, 2009
162009
Teaching Computer Architecture Using an Architecture Description Language
S Rigo, M Juliato, R Azevedo, G Araújo, P Centoducatte
Workshop on Computer Architecture Education (WCAE’04) held in conjunction …, 2004
162004
Sensor Signal Processing to Determine Finger and/or Hand Position
M Juliato
US Patent App. 15/087,385, 2017
152017
An Efficient Fault-Tolerance Technique for the Keyed-Hash Message Authentication Code
M Juliato, C Gebotys
2010 IEEE Aerospace Conference (Aeroconf'10), 1-17, 2010
152010
An Approach for Recovering Satellites and their Cryptographic Capabilities in the Presence of SEUs and Attacks
M Juliato, C Gebotys
NASA/ESA Conference on Adaptive Hardware and Systems, 2008. (AHS'08), 101-108, 2008
142008
An Approach for Recovering Satellites and their Cryptographic Capabilities in the Presence of SEUs and Attacks
M Juliato, C Gebotys
CACR Technical Report, 2008
142008
Physics-Based Approach for Attack Detection and Localization in Closed-Loop Controls for Autonomous Vehicles
M Juliato, S Ahmed, M Sastry, LL Yang, V Lesi, L Zhao
US Patent App. 16/021,409, 2019
112019
Hardware random forest: low latency, fully reconfigurable ensemble classification
M Juliato, C Gutierrez, S Ahmed, M Sastry, L Yang, X Liu
US Patent 11,409,286, 2022
82022
A Custom Instruction Approach for Hardware and Software Implementations of Finite Field Arithmetic over F_{2^{163}} using Gaussian Normal Bases
M Juliato, G Araujo, J López, R Dahab
The Journal of VLSI Signal Processing Systems for Signal, Image, and Video …, 2007
82007
Ego Actions in Response to Misbehaving Vehicle Identification
X Liu, L Yang, M Sastry, M Juliato, S Ahmed, C Gutierrez
US Patent App. 16/727,785, 2020
72020
On the Specification of Symmetric Key Management Parameters for Secure Space Missions
M Juliato, C Gebotys, IA Sanchez
2012 IEEE First AESS European Conference on Satellite Telecommunications …, 2012
72012
Technologies to Facilitate Automated Driving Assistance Based on Objects Sensed and Reported by Remote Senders
LL Yang, MR Sastry, X Liu, M Ambrosin, S Ahmed, M Juliato, ...
US Patent App. 16/145,285, 2019
62019
Two-Point Voltage Fingerprinting: Increasing Detectability of ECU Masquerading Attacks
S Ahmed, M Juliato, C Gutierrez, M Sastry
7th Embedded Security in Cars Conference (ESCAR'19), 2019
62019
The system can't perform the operation now. Try again later.
Articles 1–20