Security Analysis of Encrypted Virtual Machines.
Felicitas HetzeltRobert BuhrenPublished in: CoRR (2016)
Keyphrases
- security analysis
- virtual machine
- encryption algorithm
- encryption scheme
- operating system
- smart card
- public key
- data center
- high security
- security requirements
- authentication protocol
- security model
- standard model
- image encryption
- ciphertext
- data sharing
- secret key
- windows xp
- database
- user authentication
- lossless compression
- intrusion detection
- databases