2011 IEEE EUROCON - International Conference on Computer as a Tool 2011
DOI: 10.1109/eurocon.2011.5929187
|View full text |Cite
|
Sign up to set email alerts
|

Generalized secure hash algorithm: SHA-X

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 8 publications
0
0
0
Order By: Relevance
“…Along with the expense of renting the VMs, clients must pay for the storage and transfer of data in and out of these archives. (4) Recently, cloud providers: Azure Drives or Amazon EBS offered the option to link cloud storage in the form of the virtual volumes to the registration hubs. Not only is this option susceptible to identically elevated delays by the usual storage access, but it also offers flexibility and sharing restrictions because only one VM can mount such a volume at a time.…”
Section: Introductionmentioning
confidence: 99%
“…Along with the expense of renting the VMs, clients must pay for the storage and transfer of data in and out of these archives. (4) Recently, cloud providers: Azure Drives or Amazon EBS offered the option to link cloud storage in the form of the virtual volumes to the registration hubs. Not only is this option susceptible to identically elevated delays by the usual storage access, but it also offers flexibility and sharing restrictions because only one VM can mount such a volume at a time.…”
Section: Introductionmentioning
confidence: 99%