Gotowa bibliografia na temat „Deep attestation”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Deep attestation”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Deep attestation"
Sugimura, Yasuhiko. "“Demeurer vivant jusqu’à...”: La question de la vie et de la mort et le “religieux commun” chez le dernier Ricœur". Études Ricoeuriennes / Ricoeur Studies 3, nr 2 (14.12.2012): 26–37. http://dx.doi.org/10.5195/errs.2012.142.
Pełny tekst źródłaJennings, James P., i Eleanor G. Henry. "An Instructional Case in the Ethics of Accounting Disclosures: Springfield Medical Center". Issues in Accounting Education 14, nr 1 (1.02.1999): 55–73. http://dx.doi.org/10.2308/iace.1999.14.1.55.
Pełny tekst źródłaLyons, William John. "A Prophet Is Rejected in His Home Town (Mark 6.4 and Parallels): A Study in the Methodological (In)Consistency of the Jesus Seminar". Journal for the Study of the Historical Jesus 6, nr 1 (2008): 59–84. http://dx.doi.org/10.1163/174551908x266033.
Pełny tekst źródłaZhang, Libo, Bing Duan, Jinlong Li, Zhan’gang Ma i Xixin Cao. "A TEE-Based Federated Privacy Protection Method: Proposal and Implementation". Applied Sciences 14, nr 8 (22.04.2024): 3533. http://dx.doi.org/10.3390/app14083533.
Pełny tekst źródłaBock, Bettina. "GERMAN STAMMBAUM ‘FAMILY TREE’ — A MULTIMODAL WORD HISTORY". German Philology at the St Petersburg State University 12 (2022): 454–73. http://dx.doi.org/10.21638/spbu33.2022.124.
Pełny tekst źródłaTarkhov, Kirill Yu. "Scientific Laboratory “Moscow Polyclinic”: Experience of Project Implementation". City Healthcare 4, nr 3 (29.09.2023): 130–43. http://dx.doi.org/10.47619/2713-2617.zm.2023.v.4i3;130-143.
Pełny tekst źródłaUpadhyay, Shrikant, Mohit Kumar, Ashwani Kumar, Kayhan Zrar Ghafoor i S. Manoharan. "SmHeSol (IoT-BC): Smart Healthcare Solution for Future Development Using Speech Feature Extraction Integration Approach with IoT and Blockchain". Journal of Sensors 2022 (30.05.2022): 1–13. http://dx.doi.org/10.1155/2022/3862860.
Pełny tekst źródłaFisun, A. Ya, V. A. Yakovlev i Yu S. Malov. "In memory of Komarov Fyodor Ivanovich (on the occasion of his centenary)". Bulletin of the Russian Military Medical Academy 22, nr 3 (15.12.2020): 232–36. http://dx.doi.org/10.17816/brmma50566.
Pełny tekst źródłaAnna V., Volochaeva. "Zoya Veniaminovna Moshkina – Leading Scientist on the History of Political Hard Labor and Exile in Transbaikalia". Humanitarian Vector 17, nr 3 (październik 2022): 145–54. http://dx.doi.org/10.21209/1996-7853-2022-17-3-145-154.
Pełny tekst źródłaVolkhonskaya, Elena N., Ekaterina V. Nikonorova i Ekaterina A. Shibaeva. "Interdisciplinary Discourse and Improvement of Scientometric Indicators as Trends in the Development of the “Bibliotekovedenie” Journal". Bibliotekovedenie [Russian Journal of Library Science] 72, nr 4 (18.09.2023): 370–83. http://dx.doi.org/10.25281/0869-608x-2023-72-4-370-383.
Pełny tekst źródłaRozprawy doktorskie na temat "Deep attestation"
Jacques, Thibaut. "Protocoles d’attestation dans les environnements dynamiques". Electronic Thesis or Diss., Limoges, 2024. http://www.theses.fr/2024LIMO0078.
Pełny tekst źródłaNetwork Functions Virtualisation (NFV) is a networking paradigm where network functions are implemented as software running inside virtualised instances (such as virtual machines or containers) rather than on dedicated hardware. This results in a cloud-like architecture where the virtual network functions (VNFs) are managed on a platform called the Network Function Virtualisation Infrastructure (NFVI). The use of NFVs adds more flexibility to the network. Operators can easily adapt their network by adding, removing, or moving VNFs between servers to scale up or down, or to deploy new services on demand. However, with this flexibility come security challenges. The European Telecommunications Standards Institute (ETSI) recommends the use of remote attestation as one of the tools to secure such an infrastructure. An attestation protocol is a two-party cryptographic protocol in which a prover provides evidence about one or more properties to a verifier. Deep attestation extends the concept of attestation to a virtualized environment, where both the virtual instance and the underlying infrastructure are attested. Although remote attestation, and to a lesser extent deep attestation, are not new techniques, current approaches are not suitable for the NFV environment. In this thesis, we propose three privacy-preserving attestation protocols for the NFV context. We formally prove the security of our proposals. In addition, we demonstrate the effectiveness of our protocols with implementations and experimental results. A first scheme establishes the concept of deep attestation and enhances the current state-of-the-art by providing a solution that strikes a balance between the security and performance of the two predominant existing methods. Based on this building block, we introduce two new schemes that respond to more complex use cases. These schemes take into account the privacy issues that arise in multi-tenant virtualised networks, while being efficient even on large infrastructures and maintaining the security guarantees of the basic building block
Części książek na temat "Deep attestation"
Algawi, Asaf, Michael Kiperberg, Roee Shimon Leon, Amit Resh i Nezer Jacob Zaidenberg. "Modern Blue Pills and Red Pills". W Encyclopedia of Criminal Activities and the Deep Web, 1136–49. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9715-5.ch078.
Pełny tekst źródłaNeil, Andrews. "Part II Formation, 5 Formality". W Contract Law in Practice. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780192897947.003.0005.
Pełny tekst źródłaStreszczenia konferencji na temat "Deep attestation"
Celesti, Antonio, Maria Fazio, Massimo Villari, Antonio Puliafito i Davide Mulfari. "Remote and deep attestations to mitigate threats in Cloud Mash-Up services". W 2013 World Congress on Computer and Information Technology (WCCIT). IEEE, 2013. http://dx.doi.org/10.1109/wccit.2013.6618763.
Pełny tekst źródła