Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Hosseinzadeh, Shohreh"'
Intel Software Guard Extensions (SGX) is a promising hardware-based technology for protecting sensitive computations from potentially compromised system software. However, recent research has shown that SGX is vulnerable to branch-shadowing -- a side
Externí odkaz:
http://arxiv.org/abs/1808.06478
Autor:
Hosseinzadeh, Shohreh, Rauti, Sampsa, Laurén, Samuel, Mäkelä, Jari-Matti, Holvitie, Johannes, Hyrynsalmi, Sami, Leppänen, Ville
Publikováno v:
In Information and Software Technology December 2018 104:72-93
Publikováno v:
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
Agência para a Sociedade do Conhecimento (UMIC)-FCT-Sociedade da Informação
instacron:RCAAP
Agência para a Sociedade do Conhecimento (UMIC)-FCT-Sociedade da Informação
instacron:RCAAP
Submitted by (prmi@ubi.pt) on 2020-02-09T16:38:14Z No. of bitstreams: 1 Recent_trends_in_applying_TPM_to_cloud_computing.pdf: 1714359 bytes, checksum: ead875d549786b3830229849b71c8287 (MD5) Approved for entry into archive by Pessoa (pfep@ubi.pt) on 2
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3b737d6f3fcb65652466b050256be6ea
https://hdl.handle.net/10400.6/9233
https://hdl.handle.net/10400.6/9233
Autor:
Hosseinzadeh, Shohreh1 (AUTHOR) shohos@utu.fi, Sequeiros, Bernardo2 (AUTHOR), Inácio, Pedro R. M.2 (AUTHOR), Leppänen, Ville1 (AUTHOR)
Publikováno v:
Security & Privacy. Jan2020, Vol. 3 Issue 1, pN.PAG-N.PAG. 1p.
Autor:
Rauti, Sampsa, Koivunen, Lauri, Mäki, Petteri, Hosseinzadeh, Shohreh, Laurén, Samuel, Holvitie, Johannes, Leppänen, Ville
Publikováno v:
Journal of Sensor & Actuator Networks; Mar2018, Vol. 7 Issue 1, p12, 20p
Autor:
Rauti, Sampsa, Lauren, Samuel, Uitto, Joni, Hosseinzadeh, Shohreh, Ruohonen, Jukka, Hyrynsalmi, Sami, Leppänen, Ville
Publikováno v:
Secure IT Systems (9783319475592); 2016, p152-168, 17p
Autor:
Rauti, Sampsa, Laurén, Samuel, Hosseinzadeh, Shohreh, Mäkelä, Jari-Matti, Hyrynsalmi, Sami, Leppänen, Ville
Publikováno v:
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers; 2015, p15-35, 21p
Publikováno v:
2015 IEEE 7th International Conference on Cloud Computing Technology & Science (CloudCom); 1/1/2015, p529-535, 7p
Publikováno v:
2015 International Conference on Computing, Communication & Security (ICCCS); 2015, p1-5, 5p
Autor:
Lauren, Samuel, Maki, Petteri, Rauti, Sampsa, Hosseinzadeh, Shohreh, Hyrynsalmi, Sami, Leppanen, Ville
Publikováno v:
World Congress on Internet Security (WorldCIS-2014); 2014, p74-79, 6p