|
Conferences in DBLP
Secure control of portable images in a virtual computing utility. [Citation Graph (, )][DBLP]
VEP: a virtual machine for extended proof-carrying code. [Citation Graph (, )][DBLP]
Efficiently tracking application interactions using lightweight virtualization. [Citation Graph (, )][DBLP]
Using virtual machines to do cross-layer damage assessment. [Citation Graph (, )][DBLP]
Boxing clever with IOMMUs. [Citation Graph (, )][DBLP]
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. [Citation Graph (, )][DBLP]
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. [Citation Graph (, )][DBLP]
|