-
1
-
-
81355146314
-
Study of privacy-preserving framework for cloud storage
-
R. W. Huang, X. L. Gui, S. Yu, W. Zhuang, "Study of Privacy-Preserving Framework for Cloud Storage", Computer Science and Information Systems, vol. 8, no. 3, pp. 801-819, 2011. [Online]. Available: http://dx.doi.org/10.2298/CSIS100327029R
-
(2011)
Computer Science and Information Systems
, vol.8
, Issue.3
, pp. 801-819
-
-
Huang, R.W.1
Gui, X.L.2
Yu, S.3
Zhuang, W.4
-
2
-
-
84877986455
-
A VMM-based intrusion prevention system in cloud computing environment
-
to be published
-
H. Jin, G. F. Xiang, D. Q. Zou, S. Wu, F. Zhao, M. Li, W. D. Zheng, "A VMM-based intrusion prevention system in cloud computing environment", Journal of Supercomputing, to be published.
-
Journal of Supercomputing
-
-
Jin, H.1
Xiang, G.F.2
Zou, D.Q.3
Wu, S.4
Zhao, F.5
Li, M.6
Zheng, W.D.7
-
3
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Berlin
-
P. C. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems", in Proc. of the 16th Annual International Cryptology Conference, Berlin, 1996, pp. 104-113.
-
(1996)
Proc. of the 16th Annual International Cryptology Conference
, pp. 104-113
-
-
Kocher, P.C.1
-
4
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York
-
T. Ristenpart T, T. Eran, S. Hovav, S. Stefan, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds", in Proc. of the 6th ACM Conference on Computer and Communications Security, New York, 2009, pp. 199-212.
-
(2009)
Proc. of the 6th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.T.1
Eran, T.2
Hovav, S.3
Stefan, S.4
-
5
-
-
80052008862
-
Home Alone: Co-residency detection in the cloud via side-channel analysis
-
New York
-
Y. Zhang, J. Ari, O. Alina, and K.P Michael, "Home Alone: Co-residency detection in the cloud via side-channel analysis", in Proc. of the 2011 IEEE Symposium on Security and Privacy, New York, 2011, pp. 313-328. [Online]. Available: http://dx.doi.org/10.1109/SP.2011.31
-
(2011)
Proc. of the 2011 IEEE Symposium on Security and Privacy
, pp. 313-328
-
-
Zhang, Y.1
Ari, J.2
Alina, O.3
Michael, K.P.4
-
6
-
-
74349098073
-
Efficient cache attacks on AES, and countermeasure
-
E. Tromer, D. A. Osvik, A. Shamir, "Efficient cache attacks on AES, and countermeasure", Journal of Cryptology, vol. 23, no. 1, pp. 37-71, 2010. [Online]. Available: http://dx.doi.org/10.1007/s00145-009-9049-y
-
(2010)
Journal of Cryptology
, vol.23
, Issue.1
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
8
-
-
62149101392
-
A new cognitive model: Cloud model
-
D. Y. Li, C. Y. Liu, W. Y. Gan, "A new cognitive model: cloud model", International Journal of Intelligent Systems, vol. 24, no. 3, pp. 357-375, 2009. [Online]. Available: http://dx.doi.org/10.1002/int.20340
-
(2009)
International Journal of Intelligent Systems
, vol.24
, Issue.3
, pp. 357-375
-
-
Li, D.Y.1
Liu, C.Y.2
Gan, W.Y.3
|