Login / Signup
Hypervisor-based background encryption.
Yushi Omote
Yosuke Chubachi
Takahiro Shinagawa
Tomohiro Kitamura
Hideki Eiraku
Katsuya Matsubara
Published in:
SAC (2012)
Keyphrases
</>
operating system
virtual machine
foreground objects
security properties
encryption algorithms
encryption decryption
data sets
neural network
database systems
security analysis
cryptographic protocols
image encryption