메뉴 건너뛰기




Volumn 11, Issue 1, 2013, Pages 86-89

The threat in the cloud

Author keywords

cloud computing; computer security; cryptography; side channel attacks; virtual machines

Indexed keywords

SIDE CHANNEL ATTACK; VIRTUAL MACHINES;

EID: 84873338342     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2013.20     Document Type: Article
Times cited : (19)

References (6)
  • 3
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and Other Systems
    • Advances in Cryptology - CRYPTO '96
    • P.C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Proc. 16th Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto 96), Springer, 1996, pp. 104-113; www.cryptography.com/public/pdf/TimingAttacks.pdf. (Pubitemid 126106234)
    • (1996) Lecture Notes in Computer Science , Issue.1109 , pp. 104-113
    • Kocher, P.C.1
  • 5
    • 84873392842 scopus 로고    scopus 로고
    • Cross-VM vulnerabilities in cloud computing
    • T. Ristenpart et al., "Cross-VM Vulnerabilities in Cloud Computing," presentation at 29th Int'l Cryptology Conf. (Crypto 09) rump session, 2009; http://rump2009.cr.yp.to/8d9cebc9ad358331fcde611bf45f735d.pdf.
    • (2009) 29th Int'l Cryptology Conf. (Crypto 09) Rump Session
    • Ristenpart, T.1
  • 6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.