Results 11 to 20 of about 124,809 (301)
Open Virtual Trusted Execution Environment [PDF]
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet their use has been limited primarily to applications developed by the device vendors. Recent standardization of TEE interfaces by GlobalPlatform (GP) promises to partially address this problem by enabling GP-compliant trusted applications to run on TEEs from
McGillion, Brian +4 more
core +6 more sources
Distributed Privacy Protection Data Search Scheme [PDF]
Aiming at the problem of data island caused by high-sensitivity data in the cloud,which makes the data unable to search,discover and share with each other,a distributed privacy protection data search scheme is proposed to realize the two-way ...
LIU Ming-da, SHI Yi-juan, RAO Xiang, FAN Lei
doaj +1 more source
MeetGo: A Trusted Execution Environment for Remote Applications on FPGA
Remote computing has emerged as a trendy computing model that enables users to process an immense number of computations efficiently on the remote server where the necessary data and high-performance computing power are provisioned.
Hyunyoung Oh +4 more
doaj +1 more source
Profiling with Trust: System Monitoring from Trusted Execution Environments
Abstract Large-scale attacks on IoT and edge computing devices pose a significant threat. As a prominent example, Mirai is an IoT botnet with 600,000 infected devices around the globe, capable of conducting effective and targeted DDoS attacks on (critical) infrastructure.
Eichler, Christian +5 more
openaire +2 more sources
A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment
The increasing transformation from the legacy power grid to the smart grid brings new opportunities and challenges to power system operations. Bidirectional communications between home-area devices and the distribution system empower smart grid ...
Mete Akgun +2 more
doaj +1 more source
Application progress of SGX in trusted computing area
The trusted computing technology SGX protects the confidentiality and integrity of key codes and data by isolating a trusted execution environment, which can help prevent all kinds of attacks.Firstly, the research background and working principle of SGX ...
Bo ZHAO, Anqi YUAN, Yang AN
doaj +3 more sources
SofTEE: Software-Based Trusted Execution Environment for User Applications
Commodity operating systems are considered vulnerable. Therefore, when an application handles security-sensitive data, it is highly recommended to run the application in a trusted execution environment.
Unsung Lee, Chanik Park
doaj +1 more source
Multi-source data fusion techniques are widely applied in dynamic target detection scenarios, such as target situational awareness, radar signal resolution, and feature fusion labeling.
Nan Yang +5 more
doaj +1 more source
The relevance of the present study is confirmed by the need for implementing technologies of program code, controlled execution for general-purpose systems and for systems, which are used in critical information infrastructure (CII).
Aleksandr G. Burtsev +2 more
doaj +1 more source
Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling
A Trusted Execution Environment (TEE) sets a platform to secure applications based on the Chain-of-Trust (CoT). The starting point of the CoT is called the Root-of-Trust (RoT). However, the RoT implementation often relies on obscurity and provides little
Trong-Thuc Hoang +7 more
doaj +1 more source

