Architectural support for hypervisor-secure virtualization
- 3 March 2012
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM) in Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '12
Abstract
No abstract availableThis publication has 24 references indexed in Scilit:
- Fully homomorphic encryption using ideal latticesPublished by Association for Computing Machinery (ACM) ,2009
- Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile ComputingPublished by Springer Science and Business Media LLC ,2009
- FlickerPublished by Association for Computing Machinery (ACM) ,2008
- OvershadowPublished by Association for Computing Machinery (ACM) ,2008
- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware ImplementationsLecture Notes in Computer Science, 2007
- Direct anonymous attestationPublished by Association for Computing Machinery (ACM) ,2004
- Self-migration of operating systemsPublished by Association for Computing Machinery (ACM) ,2004
- AEGISPublished by Association for Computing Machinery (ACM) ,2003
- Memory resource management in VMware ESX serverACM SIGOPS Operating Systems Review, 2002
- Architectural support for copy and tamper resistant softwarePublished by Association for Computing Machinery (ACM) ,2000