Results 1 to 10 of about 124,809 (301)

Trusted Execution Environment [PDF]

open access: gold, 2023
AbstractTrusted execution environments are secure areas of central processors or devices that execute code with higher security than the rest of the device. Security is provided by encrypted memory regions called enclaves. Because the environment is isolated from the rest of the device, it is not affected by infection or compromise of the device ...
Maria Sommerhalder
  +4 more sources

FairCs—Blockchain-Based Fair Crowdsensing Scheme using Trusted Execution Environment [PDF]

open access: yesSensors, 2020
Crowdsensing applications provide platforms for sharing sensing data collected by mobile devices. A blockchain system has the potential to replace a traditional centralized trusted third party for crowdsensing services to perform operations that involve ...
Yihuai Liang, Yan Li, Byeong-Seok Shin
doaj   +2 more sources

Trust-DETM: Distributed Energy Trading Model Based on Trusted Execution Environment [PDF]

open access: goldMathematics, 2023
The traditional centralized power trading model suffers from high maintenance costs, low processing efficiency and unsynchronized information, and it cannot adapt to the high-frequency and small-dollar distributed energy trading scenario.
Xin Lu, Hongchen Guo
doaj   +2 more sources

Quick Boot of Trusted Execution Environment With Hardware Accelerators [PDF]

open access: goldIEEE Access, 2020
The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode.
Trong-Thuc Hoang   +6 more
doaj   +2 more sources

Teechan: Payment Channels Using Trusted Execution Environments [PDF]

open access: green, 2016
Blockchain protocols are inherently limited in transaction throughput and latency. Recent efforts to address performance and scale blockchains have focused on off-chain payment channels. While such channels can achieve low latency and high throughput, deploying them securely on top of the Bitcoin blockchain has been difficult, partly because building a
Joshua Lind   +3 more
  +6 more sources

A Design and Verification Methodology for a TrustZone Trusted Execution Environment [PDF]

open access: goldIEEE Access, 2020
Hardware support for isolated execution (e.g., ARM TrustZone) enables the development of a trusted execution environment (TEE) that ensures the security of the code and data while communicating with a compromised rich execution environment (REE).
Haiyong Sun, Hang Lei
doaj   +2 more sources

Trusted Execution Environments: Applications and Organizational Challenges

open access: yesFrontiers in Computer Science, 2022
A lack of trust in the providers is still a major barrier to cloud computing adoption – especially when sensitive data is involved. While current privacy-enhancing technologies, such as homomorphic encryption, can increase security, they come with a ...
Tim Geppert   +3 more
doaj   +2 more sources

TeeDFuzzer: Fuzzing Trusted Execution Environment [PDF]

open access: goldElectronics
The Trusted Execution Environment (TEE) is crucial for safeguarding the ecosystem of embedded systems. It uses isolation to minimize the TCB (Trusted Computing Base) and protect sensitive software. It is vital because devices handle vast, potentially sensitive data.
Sheng Wen   +4 more
openalex   +2 more sources

SoK: Hardware-supported Trusted Execution Environments [PDF]

open access: green, 2022
The growing complexity of modern computing platforms and the need for strong isolation protections among their software components has led to the increased adoption of Trusted Execution Environments (TEEs). While several commercial and academic TEE architectures have emerged in recent times, they remain hard to compare and contrast.
Moritz Schneider   +4 more
openalex   +4 more sources

Home - About - Disclaimer - Privacy