Login / Signup
Security analysis of confidential-compute instruction set architecture for virtualized workloads.
Ravi Sahita
Dror Caspi
Barry Huntley
Vincent Scarlata
Baruch Chaikin
Siddhartha Chhabra
Arie Aharon
Ido Ouziel
Published in:
SEED (2021)
Keyphrases
</>
security analysis
smart card
security requirements
public key
encryption scheme
cloud computing
data center
access patterns
user authentication
instruction set architecture
data processing
computer systems
quadtree
instruction set