Filter the results Item type Select All/None Collection Page Event File Folder Image News Item Article Conference Course inBook Incollection Inproceedings person Phdthesis Proceedings Studentthesis Techreport New items since Yesterday Last week Last month Ever Search results Subscribe to an always-updated RSS feed. 1 items matching your search terms. Sort by relevance date (newest first) alphabetically SEVerity: Code Injection Attacks against Encrypted Virtual Machines Modern enterprises increasingly take advantage of cloud infrastructures. Yet, outsourcing code and data into the cloud requires enterprises to trust cloud ... Located in Publications