-
1
-
-
84995911143
-
Network Functions Virtualisation; Introductory White Paper. Technical Report
-
SDN and OpenFlow World Congress
-
[1] ETSI. Network Functions Virtualisation; Introductory White Paper. Technical Report., 2012, SDN and OpenFlow World Congress.
-
(2012)
-
-
-
2
-
-
84995893915
-
Network Functions Virtualisation (NFV); Infrastructure Overview. Technical Report, ETSI GS NFV-INF 001 V1.1.1
-
[2] ETSI. Network Functions Virtualisation (NFV); Infrastructure Overview. Technical Report, ETSI GS NFV-INF 001 V1.1.1., 2015.
-
(2015)
-
-
-
3
-
-
84983364558
-
Software-Defined Networking: The New Norm for Networks. Technical Report
-
ONF White Paper
-
[3] ONF. Software-Defined Networking: The New Norm for Networks. Technical Report., 2012, ONF White Paper.
-
(2012)
-
-
-
4
-
-
84904489078
-
Secure live virtual machines migration: Issues and solutions,
-
[4] M. Aiash, G. Mapp, O. Gemikonakli, Secure live virtual machines migration: Issues and solutions, in: 28th International Conference on Advanced Information Networking and Applications Workshops, 2014, pp. 160–165.
-
(2014)
28th International Conference on Advanced Information Networking and Applications Workshops
, pp. 160-165
-
-
Aiash, M.1
Mapp, G.2
Gemikonakli, O.3
-
5
-
-
84913593468
-
A survey on software-defined network and openflow: From concept to implementation
-
[5] Hu, F., Hao, Q., Bao, K., A survey on software-defined network and openflow: From concept to implementation. IEEE Commun. Surv. Tutor. 16:4 (2014), 2181–2206.
-
(2014)
IEEE Commun. Surv. Tutor.
, vol.16
, Issue.4
, pp. 2181-2206
-
-
Hu, F.1
Hao, Q.2
Bao, K.3
-
6
-
-
84957677162
-
Cloud Computing: Challenges, Limitations and R & D Solutions
-
Springer
-
[6] Shafieian, S., Zulkernine, M., Haque, A., Cloud Computing: Challenges, Limitations and R & D Solutions. 2014, Springer, 3–22.
-
(2014)
, pp. 3-22
-
-
Shafieian, S.1
Zulkernine, M.2
Haque, A.3
-
7
-
-
78649305163
-
Accelerated virtual switching with programmable NICs for scalable data center networking,
-
[7] Y. Luo, E. Murray, T.L. Ficarra, Accelerated virtual switching with programmable NICs for scalable data center networking, in: Proceedings of the Second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, 2010, pp. 65–72.
-
(2010)
Proceedings of the Second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures
, pp. 65-72
-
-
Luo, Y.1
Murray, E.2
Ficarra, T.L.3
-
8
-
-
84923855140
-
Network functions virtualization: Challenges and opportunities for innovations
-
[8] Han, B., Gopalakrishnan, V., Ji, L., Lee, S., Network functions virtualization: Challenges and opportunities for innovations. IEEE Commun. Mag. 53:2 (2015), 90–97.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.2
, pp. 90-97
-
-
Han, B.1
Gopalakrishnan, V.2
Ji, L.3
Lee, S.4
-
9
-
-
84923871402
-
An instrumentation and analytics framework for optimal and robust NFV deployment
-
[9] Veitch, P., McGrath, M.J., Bayon, V., An instrumentation and analytics framework for optimal and robust NFV deployment. IEEE Commun. Mag. 53 (2015), 126–133.
-
(2015)
IEEE Commun. Mag.
, vol.53
, pp. 126-133
-
-
Veitch, P.1
McGrath, M.J.2
Bayon, V.3
-
10
-
-
84960954325
-
Software-defined network function virtualization: A survey
-
[10] Li, Y., Chen, M., Software-defined network function virtualization: A survey. IEEE Access 3 (2015), 2542–2553.
-
(2015)
IEEE Access
, vol.3
, pp. 2542-2553
-
-
Li, Y.1
Chen, M.2
-
11
-
-
84960971825
-
Survey on network virtualization hypervisors for software defined networking
-
[11] Blenk, A., Basta, A., Reisslein, M., Kellerer, W., Survey on network virtualization hypervisors for software defined networking. IEEE Commun. Surv. Tutor. 18:1 (2016), 655–685.
-
(2016)
IEEE Commun. Surv. Tutor.
, vol.18
, Issue.1
, pp. 655-685
-
-
Blenk, A.1
Basta, A.2
Reisslein, M.3
Kellerer, W.4
-
12
-
-
84962427489
-
Network function virtualization: State-of-the-art and research challenges
-
[12] Mijumbi, R., Serrat, J., Gorricho, J.-L., Bouten, N., De Turck, F., Boutaba, R., Network function virtualization: State-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 18:1 (2016), 236–262.
-
(2016)
IEEE Commun. Surv. Tutor.
, vol.18
, Issue.1
, pp. 236-262
-
-
Mijumbi, R.1
Serrat, J.2
Gorricho, J.-L.3
Bouten, N.4
De Turck, F.5
Boutaba, R.6
-
13
-
-
84922604242
-
-
[13] D. Cotroneo, L. De Simone, A.K. Iannillo, A. Lanzaro, R. Natella, J. Fan, W. Ping, Network function virtualization: Challenges and directions for reliability assurance, in: IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW, 2014, pp. 37–42.
-
L. De Simone, A.K. Iannillo, A. Lanzaro, R. Natella, J. Fan, W. Ping, Network function virtualization: Challenges and directions for reliability assurance, in: IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW, 2014, pp. 37–42.
-
-
Cotroneo, D.1
-
14
-
-
84995907049
-
Providing Security in NFV- Challenges and Opportunities, Alcatel-Lucent White Paper. Technical Report
-
Alcatel-Lucent
-
[14] Alcatel-Lucent. Providing Security in NFV- Challenges and Opportunities, Alcatel-Lucent White Paper. Technical Report., 2014, Alcatel-Lucent.
-
(2014)
-
-
-
15
-
-
84913590313
-
NFV: state of the art, challenges and implementation in next generation mobile networks (vEPC)
-
[15] Hawilo, H., Shami, A., Mirahmadi, M., Asal, R., NFV: state of the art, challenges and implementation in next generation mobile networks (vEPC). IEEE Netw. Mag. 28:6 (2014), 18–26.
-
(2014)
IEEE Netw. Mag.
, vol.28
, Issue.6
, pp. 18-26
-
-
Hawilo, H.1
Shami, A.2
Mirahmadi, M.3
Asal, R.4
-
16
-
-
84995896734
-
Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance. Technical Report, ETSI GS NFV-SEC 003 V1.1.1
-
[16] ETSI. Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance. Technical Report, ETSI GS NFV-SEC 003 V1.1.1., 2014.
-
(2014)
-
-
-
17
-
-
84995921856
-
Network Functions Virtualisation (NFV); Infrastructure; Hypervisor Domain. Technical Report, ETSI GS NFV-INF 004 V1.1.1
-
[17] ETSI. Network Functions Virtualisation (NFV); Infrastructure; Hypervisor Domain. Technical Report, ETSI GS NFV-INF 004 V1.1.1., 2015.
-
(2015)
-
-
-
18
-
-
84995931965
-
Intel and Brocade Network Functions Virtualization Solution. Technical Report
-
Brocade Communications Systems
-
[18] BROCADE. Intel and Brocade Network Functions Virtualization Solution. Technical Report., 2014, Brocade Communications Systems.
-
(2014)
-
-
-
19
-
-
84889570735
-
Security threats and countermeasures in cloud computing
-
[19] Ashktorab, V., Taghizadeh, S.R., Security threats and countermeasures in cloud computing. Int. J. Appl. Innov. Eng. Manag. 1:2 (2012), 234–245.
-
(2012)
Int. J. Appl. Innov. Eng. Manag.
, vol.1
, Issue.2
, pp. 234-245
-
-
Ashktorab, V.1
Taghizadeh, S.R.2
-
20
-
-
73349136579
-
Shadow generation protocol in linguistic threshold schemes
-
[20] Ogiela, M.R., Ogiela, U., Shadow generation protocol in linguistic threshold schemes. Commun. Comput. Inf. Sci. 58 (2009), 35–42.
-
(2009)
Commun. Comput. Inf. Sci.
, vol.58
, pp. 35-42
-
-
Ogiela, M.R.1
Ogiela, U.2
-
21
-
-
84886731331
-
The Notorious Nine: Cloud Computing Top Threats in 2013. Technical Report
-
Cloud Security Alliance
-
[21] CSA. The Notorious Nine: Cloud Computing Top Threats in 2013. Technical Report., 2013, Cloud Security Alliance.
-
(2013)
-
-
-
22
-
-
84859902620
-
Security issues in network virtualization for the future internet,
-
[22] S. Natarajan, T. Wolf, Security issues in network virtualization for the future internet, in: International Conference on Computing, Networking and Communications, ICNC, 2012, pp. 537–543.
-
(2012)
International Conference on Computing, Networking and Communications, ICNC
, pp. 537-543
-
-
Natarajan, S.1
Wolf, T.2
-
24
-
-
84861651031
-
Transparent acceleration of software packet forwarding using netmap,
-
[24] L. Rizzo, M. Carbone, G. Catalli, Transparent acceleration of software packet forwarding using netmap, in: Proceedings of IEEE INFOCOM’2012, 2012, pp. 2471–2479.
-
(2012)
Proceedings of IEEE INFOCOM’2012
, pp. 2471-2479
-
-
Rizzo, L.1
Carbone, M.2
Catalli, G.3
-
25
-
-
84865573806
-
SideCar: Building programmable datacenter networks without programmable switches,
-
[25] A. Shieh, S. Kandula, E.G. Sirer, SideCar: Building programmable datacenter networks without programmable switches, in: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, Hotnets-IX, 2010, pp. 21:1–21:6.
-
(2010)
Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, Hotnets-IX
, pp. 21:1-21:6
-
-
Shieh, A.1
Kandula, S.2
Sirer, E.G.3
-
26
-
-
84929300230
-
-
[26] C. Kachris, G. Sirakoulis, D. Soudris, Network function virtualization based on FPGAs: A framework for all-programmable network devices, CoRR, 2014.
-
Network function virtualization based on FPGAs: A framework for all-programmable network devices, CoRR, 2014.
-
-
Kachris, C.1
Sirakoulis, G.2
Soudris, D.3
-
27
-
-
84874732333
-
SwitchBlade: A platform for rapid deployment of network protocols on programmable hardware
-
[27] Anwer, M.B., Motiwala, M., Tariq, M., Feamster, N., SwitchBlade: A platform for rapid deployment of network protocols on programmable hardware. ACM SIGCOMM Comput. Commun. Rev. 40:4 (2010), 183–194.
-
(2010)
ACM SIGCOMM Comput. Commun. Rev.
, vol.40
, Issue.4
, pp. 183-194
-
-
Anwer, M.B.1
Motiwala, M.2
Tariq, M.3
Feamster, N.4
-
28
-
-
84866502606
-
NaaS: Network-as-a-service in the cloud,
-
[28] P. Costa, M. Migliavacca, P. Pietzuch, A.L. Wolf, NaaS: Network-as-a-service in the cloud, in: 2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services, 2012.
-
(2012)
2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services
-
-
Costa, P.1
Migliavacca, M.2
Pietzuch, P.3
Wolf, A.L.4
-
29
-
-
84869441988
-
Resource-freeing attacks: Improve your cloud performance (at your neighbor's expense),
-
[29] V. Varadarajan, T. Kooburat, B. Farley, T. Ristenpart, M.M. Swift, Resource-freeing attacks: Improve your cloud performance (at your neighbor's expense), in: Proceedings of the ACM Conference on Computer and Communications Security, CCS’12, 2012, pp. 281–292.
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security, CCS’12
, pp. 281-292
-
-
Varadarajan, V.1
Kooburat, T.2
Farley, B.3
Ristenpart, T.4
Swift, M.M.5
-
30
-
-
80955142134
-
Detecting fraudulent use of cloud resources,
-
[30] J. Idziorek, M. Tannian, D. Jacobson, Detecting fraudulent use of cloud resources, in: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW’11, 2011, pp. 61–72.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW’11
, pp. 61-72
-
-
Idziorek, J.1
Tannian, M.2
Jacobson, D.3
-
31
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices,
-
[31] J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, F. Jahanian, Virtualized in-cloud security services for mobile devices, in: Proceedings of the First Workshop on Virtualization in Mobile Computing, MobiVirt’08, 2008, pp. 31–35.
-
(2008)
Proceedings of the First Workshop on Virtualization in Mobile Computing, MobiVirt’08
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
32
-
-
84866485994
-
Splendid isolation: A slice abstraction for software-defined networks
-
ACM
-
[32] Gutz, S., Story, A., Schlesinger, C., Foster, N., Splendid isolation: A slice abstraction for software-defined networks. Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN’12, 2012, ACM, 79–84.
-
(2012)
Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN’12
, pp. 79-84
-
-
Gutz, S.1
Story, A.2
Schlesinger, C.3
Foster, N.4
-
33
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys,
-
[33] Y. Zhang, A. Juels, M.K. Reiter, T. Ristenpart, Cross-VM side channels and their use to extract private keys, in: 2012 ACM Conference on Computer and Communications Security, CCS’12, 2012, pp. 305–316.
-
(2012)
2012 ACM Conference on Computer and Communications Security, CCS’12
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
-
34
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds,
-
[34] T. Ristenpart, E. Tromer, H. Shacham, S. Savage, Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds, in: Proceedings of CCS 2009, 2009, pp. 199–212.
-
(2009)
Proceedings of CCS
, vol.2009
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
35
-
-
84945979212
-
Whispers in the hyper-space: High-speed covert channel attacks in the cloud
-
USENIX
-
[35] Wu, Z., Xu, Z., Wang, Whispers in the hyper-space: High-speed covert channel attacks in the cloud. 21st USENIX Security Symposium, (USENIX Security 12), 2012, USENIX, 159–173.
-
(2012)
21st USENIX Security Symposium, (USENIX Security 12)
, pp. 159-173
-
-
Wu, Z.1
Xu, Z.2
Wang3
-
36
-
-
33745640963
-
Cache attacks and countermeasures: The case of AES,
-
[36] D.A. Osvik, A. Shamir, E. Tromer, Cache attacks and countermeasures: The case of AES, in: Proceedings of the Cryptographers’ Track at the RSA Conference on Topics in Cryptology, CT-RSA’06, 2006, pp. 1–20.
-
(2006)
Proceedings of the Cryptographers’ Track at the RSA Conference on Topics in Cryptology, CT-RSA’06
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
37
-
-
84948959975
-
C5: Cross-cores cache covert channel
-
Springer
-
[37] Maurice, Clementine, Neumann, Christoph, Heen, Olivier, Francillon, Aurelien, C5: Cross-cores cache covert channel. Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA’15, 2015, Springer, 46–64.
-
(2015)
Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA’15
, pp. 46-64
-
-
Maurice, C.1
Neumann, C.2
Heen, O.3
Francillon, A.4
-
38
-
-
84968932741
-
A placement vulnerability study in multi-tenant public clouds,
-
[38] V. Varadarajan, Y. Zhang, T. Ristenpart, M. Swift, A placement vulnerability study in multi-tenant public clouds, in: 24th USENIX Security Symposium (USENIX Security 15), 2015, pp. 913–928.
-
(2015)
24th USENIX Security Symposium (USENIX Security 15)
, pp. 913-928
-
-
Varadarajan, V.1
Zhang, Y.2
Ristenpart, T.3
Swift, M.4
-
40
-
-
84910156435
-
vTPM: Virtualizing the trusted platform module
-
[40] Berger, S., Cáceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L., vTPM: Virtualizing the trusted platform module. 15th Conference on USENIX Security Symposium USENIX-SS’06, vol. 15, 2006.
-
(2006)
15th Conference on USENIX Security Symposium, USENIX-SS’06
, vol.15
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
van Doorn, L.6
-
41
-
-
84885310053
-
Security-preserving live migration of virtual machines in the cloud
-
[41] Zhang, F., Chen, H., Security-preserving live migration of virtual machines in the cloud. J. Netw. Syst. Manage. 21:4 (2013), 562–587.
-
(2013)
J. Netw. Syst. Manage.
, vol.21
, Issue.4
, pp. 562-587
-
-
Zhang, F.1
Chen, H.2
-
42
-
-
84884996793
-
Improving security of virtual machines during live migrations,
-
[42] S. Biedermann, M. Zittel, S. Katzenbeisser, Improving security of virtual machines during live migrations, in: 2013 Eleventh Annual International Conference on Privacy, Security and Trust, PST, 2013, pp. 352–357.
-
(2013)
2013 Eleventh Annual International Conference on Privacy, Security and Trust, PST
, pp. 352-357
-
-
Biedermann, S.1
Zittel, M.2
Katzenbeisser, S.3
-
46
-
-
85038970426
-
Securing self-virtualizing ethernet devices,
-
[46] I. Smolyar, M. Ben-Yehuda, D. Tsafrir, Securing self-virtualizing ethernet devices, in: 24th USENIX Security Symposium, USENIX Security 15, 2015, pp. 335–350.
-
(2015)
24th USENIX Security Symposium, USENIX Security
, vol.15
, pp. 335-350
-
-
Smolyar, I.1
Ben-Yehuda, M.2
Tsafrir, D.3
-
47
-
-
84878355953
-
-
[47] X. Zhang, Ch. Lan, A. Perrig, Secure and scalable fault localization under dynamic traffic patterns, in: Proceedings of the IEEE Symposium on Security and Privacy, SP’12, 2012, pp. 317–331.
-
Ch. Lan, A. Perrig, Secure and scalable fault localization under dynamic traffic patterns, in: Proceedings of the IEEE Symposium on Security and Privacy, SP’12, 2012, pp. 317–331.
-
-
Zhang, X.1
-
48
-
-
84896101663
-
Dynamic trust management for delay tolerant networks and its application to secure routing
-
[48] Chen, I., Bao, F., Chang, M., Cho, J., Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans. Parallel Distrib. Syst. 25:5 (2014), 1200–1210.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.5
, pp. 1200-1210
-
-
Chen, I.1
Bao, F.2
Chang, M.3
Cho, J.4
-
50
-
-
72849114367
-
Trusted network access control in the eduroam federation,
-
[50] F. Bernal, M. Sanchez, G. López, A.F. Gomez-Skarmeta, O. Canovas, Trusted network access control in the eduroam federation, in: Third International Conference on Network and System Security, 2009, NSS’09, 2009, pp. 170–175.
-
(2009)
Third International Conference on Network and System Security, 2009, NSS’09
, pp. 170-175
-
-
Bernal, F.1
Sanchez, M.2
López, G.3
Gomez-Skarmeta, A.F.4
Canovas, O.5
-
51
-
-
85073538603
-
STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud,
-
[51] T. Kim, M. Peinado, G. Mainar-Ruiz, STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud, in: 21st USENIX Security Symposium, USENIX Security 12, 2012, pp. 189–204.
-
(2012)
21st USENIX Security Symposium, USENIX Security
, vol.12
, pp. 189-204
-
-
Kim, T.1
Peinado, M.2
Mainar-Ruiz, G.3
-
52
-
-
80052008862
-
HomeAlone: Co-residency detection in the cloud via side-channel analysis,
-
[52] Y. Zhang, A. Juels, A. Oprea, M.K. Reiter, HomeAlone: Co-residency detection in the cloud via side-channel analysis, in: 2011 IEEE Symposium on Security and Privacy, SP’11, 2011, pp. 313–328.
-
(2011)
2011 IEEE Symposium on Security and Privacy, SP’11
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
-
54
-
-
84966539938
-
Private processing of outsourced network functions: Feasibility and constructions
-
ACM
-
[54] Melis, L., Asghar, H.J., De Cristofaro, E., Kaafar, M.A., Private processing of outsourced network functions: Feasibility and constructions. The 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFV Security’16, 2016, ACM, 39–44.
-
(2016)
The 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFV Security’16
, pp. 39-44
-
-
Melis, L.1
Asghar, H.J.2
De Cristofaro, E.3
Kaafar, M.A.4
-
59
-
-
84995896860
-
Trusted Platform Module Evolution. Technical Report 2
-
Johns Hopkins APL Technical Digest
-
[59] Osborn, J.D., Challener, D.C., Trusted Platform Module Evolution. Technical Report 2., 2013, Johns Hopkins APL Technical Digest.
-
(2013)
-
-
Osborn, J.D.1
Challener, D.C.2
-
60
-
-
84979945606
-
fTPM: A Firmware-based TPM 2.0 Implementation. Technical Report MSR-TR-2015-84
-
Microsoft Research
-
[60] Raj, H., Saroiu, S., Wolman, A., Aigner, R., Cox, J., England, P., Fenner, C., Kinshumann, K., Loeser, J., Mattoon, D., Nystrom, M., Robinson, D., Spiger, R., Thom, S., Wooten, D., fTPM: A Firmware-based TPM 2.0 Implementation. Technical Report MSR-TR-2015-84., 2015, Microsoft Research.
-
(2015)
-
-
Raj, H.1
Saroiu, S.2
Wolman, A.3
Aigner, R.4
Cox, J.5
England, P.6
Fenner, C.7
Kinshumann, K.8
Loeser, J.9
Mattoon, D.10
Nystrom, M.11
Robinson, D.12
Spiger, R.13
Thom, S.14
Wooten, D.15
-
61
-
-
84903846058
-
A minimalist approach to remote attestation,
-
[61] A. Francillon, Q. Nguyen, K.B. Rasmussen, G. Tsudik, A minimalist approach to remote attestation, in: Proceedings of the Conference on Design, Automation & Test in Europe, DATE’14, Vol. 466, 2014, pp. 1–6.
-
(2014)
Proceedings of the Conference on Design, Automation & Test in Europe, DATE’14
, vol.466
, pp. 1-6
-
-
Francillon, A.1
Nguyen, Q.2
Rasmussen, K.B.3
Tsudik, G.4
-
62
-
-
54249112442
-
A software-based trusted platform module emulator
-
Springer-Verlag
-
[62] Strasser, M., Stamer, H., A software-based trusted platform module emulator. 1st International Conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications, Trust’08, 2008, Springer-Verlag, 33–47.
-
(2008)
1st International Conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications, Trust’08
, pp. 33-47
-
-
Strasser, M.1
Stamer, H.2
-
63
-
-
84903700745
-
Hardware-based Security for Virtual Trusted Platform Modules. Technical Report
-
arXiv preprint
-
[63] Alsouri, S., Feller, T., Malipatlolla, S., Katzenbeisser, S., Hardware-based Security for Virtual Trusted Platform Modules. Technical Report., 2013 arXiv preprint.
-
(2013)
-
-
Alsouri, S.1
Feller, T.2
Malipatlolla, S.3
Katzenbeisser, S.4
-
64
-
-
84995979932
-
High Assurance Platform. Technical Report
-
HAP Fact sheet, National Security Agency
-
[64] NSA. High Assurance Platform. Technical Report., 2011, HAP Fact sheet, National Security Agency.
-
(2011)
-
-
-
65
-
-
84926159255
-
Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure
-
[65] Dai, H., Zhao, Sh., Zhang, Qiu, M.J., Tao, L., Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure. Future Gener. Comput. Syst. 52:C (2015), 147–155.
-
(2015)
Future Gener. Comput. Syst.
, vol.52
, Issue.100
, pp. 147-155
-
-
Dai, H.1
Zhao, S.2
Zhang3
Qiu, M.J.4
Tao, L.5
|