Author:
Zhang Yinqian,Juels Ari,Oprea Alina,Reiter Michael K.
Cited by
198 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Public Integrity Verification for Run-time Model in Batches without a Local Server;2024 9th International Conference on Electronic Technology and Information Science (ICETIS);2024-05-17
2. Pentimento: Data Remanence in Cloud FPGAs;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2;2024-04-27
3. Everywhere All at Once: Co-Location Attacks on Public Cloud FaaS;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1;2024-04-17
4. Priority-based security-aware virtual machine allocation policy;International Journal of Information and Computer Security;2024
5. Cyber Attack Victim Separation: New Dimensions to Minimize Attack Effects by Resource Management;Studies in Big Data;2024