Academic literature on the topic 'Deep attestation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Deep attestation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Deep attestation"
Sugimura, Yasuhiko. "“Demeurer vivant jusqu’à...”: La question de la vie et de la mort et le “religieux commun” chez le dernier Ricœur." Études Ricoeuriennes / Ricoeur Studies 3, no. 2 (December 14, 2012): 26–37. http://dx.doi.org/10.5195/errs.2012.142.
Full textJennings, James P., and Eleanor G. Henry. "An Instructional Case in the Ethics of Accounting Disclosures: Springfield Medical Center." Issues in Accounting Education 14, no. 1 (February 1, 1999): 55–73. http://dx.doi.org/10.2308/iace.1999.14.1.55.
Full textLyons, William John. "A Prophet Is Rejected in His Home Town (Mark 6.4 and Parallels): A Study in the Methodological (In)Consistency of the Jesus Seminar." Journal for the Study of the Historical Jesus 6, no. 1 (2008): 59–84. http://dx.doi.org/10.1163/174551908x266033.
Full textZhang, Libo, Bing Duan, Jinlong Li, Zhan’gang Ma, and Xixin Cao. "A TEE-Based Federated Privacy Protection Method: Proposal and Implementation." Applied Sciences 14, no. 8 (April 22, 2024): 3533. http://dx.doi.org/10.3390/app14083533.
Full textBock, Bettina. "GERMAN STAMMBAUM ‘FAMILY TREE’ — A MULTIMODAL WORD HISTORY." German Philology at the St Petersburg State University 12 (2022): 454–73. http://dx.doi.org/10.21638/spbu33.2022.124.
Full textTarkhov, Kirill Yu. "Scientific Laboratory “Moscow Polyclinic”: Experience of Project Implementation." City Healthcare 4, no. 3 (September 29, 2023): 130–43. http://dx.doi.org/10.47619/2713-2617.zm.2023.v.4i3;130-143.
Full textUpadhyay, Shrikant, Mohit Kumar, Ashwani Kumar, Kayhan Zrar Ghafoor, and S. Manoharan. "SmHeSol (IoT-BC): Smart Healthcare Solution for Future Development Using Speech Feature Extraction Integration Approach with IoT and Blockchain." Journal of Sensors 2022 (May 30, 2022): 1–13. http://dx.doi.org/10.1155/2022/3862860.
Full textFisun, A. Ya, V. A. Yakovlev, and Yu S. Malov. "In memory of Komarov Fyodor Ivanovich (on the occasion of his centenary)." Bulletin of the Russian Military Medical Academy 22, no. 3 (December 15, 2020): 232–36. http://dx.doi.org/10.17816/brmma50566.
Full textAnna V., Volochaeva. "Zoya Veniaminovna Moshkina – Leading Scientist on the History of Political Hard Labor and Exile in Transbaikalia." Humanitarian Vector 17, no. 3 (October 2022): 145–54. http://dx.doi.org/10.21209/1996-7853-2022-17-3-145-154.
Full textVolkhonskaya, Elena N., Ekaterina V. Nikonorova, and Ekaterina A. Shibaeva. "Interdisciplinary Discourse and Improvement of Scientometric Indicators as Trends in the Development of the “Bibliotekovedenie” Journal." Bibliotekovedenie [Russian Journal of Library Science] 72, no. 4 (September 18, 2023): 370–83. http://dx.doi.org/10.25281/0869-608x-2023-72-4-370-383.
Full textDissertations / Theses on the topic "Deep attestation"
Jacques, Thibaut. "Protocoles d’attestation dans les environnements dynamiques." Electronic Thesis or Diss., Limoges, 2024. http://www.theses.fr/2024LIMO0078.
Full textNetwork Functions Virtualisation (NFV) is a networking paradigm where network functions are implemented as software running inside virtualised instances (such as virtual machines or containers) rather than on dedicated hardware. This results in a cloud-like architecture where the virtual network functions (VNFs) are managed on a platform called the Network Function Virtualisation Infrastructure (NFVI). The use of NFVs adds more flexibility to the network. Operators can easily adapt their network by adding, removing, or moving VNFs between servers to scale up or down, or to deploy new services on demand. However, with this flexibility come security challenges. The European Telecommunications Standards Institute (ETSI) recommends the use of remote attestation as one of the tools to secure such an infrastructure. An attestation protocol is a two-party cryptographic protocol in which a prover provides evidence about one or more properties to a verifier. Deep attestation extends the concept of attestation to a virtualized environment, where both the virtual instance and the underlying infrastructure are attested. Although remote attestation, and to a lesser extent deep attestation, are not new techniques, current approaches are not suitable for the NFV environment. In this thesis, we propose three privacy-preserving attestation protocols for the NFV context. We formally prove the security of our proposals. In addition, we demonstrate the effectiveness of our protocols with implementations and experimental results. A first scheme establishes the concept of deep attestation and enhances the current state-of-the-art by providing a solution that strikes a balance between the security and performance of the two predominant existing methods. Based on this building block, we introduce two new schemes that respond to more complex use cases. These schemes take into account the privacy issues that arise in multi-tenant virtualised networks, while being efficient even on large infrastructures and maintaining the security guarantees of the basic building block
Book chapters on the topic "Deep attestation"
Algawi, Asaf, Michael Kiperberg, Roee Shimon Leon, Amit Resh, and Nezer Jacob Zaidenberg. "Modern Blue Pills and Red Pills." In Encyclopedia of Criminal Activities and the Deep Web, 1136–49. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9715-5.ch078.
Full textNeil, Andrews. "Part II Formation, 5 Formality." In Contract Law in Practice. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780192897947.003.0005.
Full textConference papers on the topic "Deep attestation"
Celesti, Antonio, Maria Fazio, Massimo Villari, Antonio Puliafito, and Davide Mulfari. "Remote and deep attestations to mitigate threats in Cloud Mash-Up services." In 2013 World Congress on Computer and Information Technology (WCCIT). IEEE, 2013. http://dx.doi.org/10.1109/wccit.2013.6618763.
Full text