User-Based CPU Verification Scheme for Public Cloud Computing
暂无分享,去创建一个
Jie Wu | Chiu Chiang Tan | Huanyang Zheng | Kangkang Li | Jie Wu | C. C. Tan | Kangkang Li | Huanyang Zheng
[1] Kirk L. Kroeker,et al. The evolution of virtualization , 2009, CACM.
[2] Jon Watson,et al. VirtualBox: bits and bytes masquerading as machines , 2008 .
[3] Paul Hofmann,et al. Cloud Computing: The Limits of Public Clouds for Business Applications , 2010, IEEE Internet Computing.
[4] Benjamin Farley,et al. More for your money: exploiting performance heterogeneity in public clouds , 2012, SoCC '12.
[5] Eyal de Lara,et al. SnowFlock: rapid virtual machine cloning for cloud computing , 2009, EuroSys '09.
[6] Eike Kiltz,et al. Practical Chosen Ciphertext Secure Encryption from Factoring , 2009, EUROCRYPT.
[7] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[8] Manish Vachharajani,et al. An efficient software transactional memory using commit-time invalidation , 2010, CGO '10.
[9] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[10] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[11] Nathan Regola,et al. Recommendations for Virtualization Technologies in High Performance Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[12] Martin Mauve,et al. Offline Submission with RSA Time-Lock Puzzles , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[13] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[14] David Nowak,et al. On Formal Verification of Arithmetic-Based Cryptographic Primitives , 2009, ICISC.
[15] Takeo Kanade,et al. Information Security and Cryptology - ICISC 2008 , 2009 .
[16] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[17] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[18] S. Vadhan,et al. Time-Lock Puzzles in the Random Oracle , 2011 .