Results 11 to 20 of about 115,293 (296)

Elevating Security in Migration: An Enhanced Trusted Execution Environment-Based Generic Virtual Remote Attestation Scheme

open access: goldInformation
Cloud computing, as the most widely applied and prominent domain of distributed systems, has brought numerous advantages to users, including high resource sharing efficiency, strong availability, and excellent scalability.
Jie Yuan   +4 more
doaj   +2 more sources

On Making Emerging Trusted Execution Environments Accessible to Developers

open access: green, 2015
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions.
Thomas Nyman, Brian McGillion, N. Asokan
openalex   +4 more sources

Towards Modular Trusted Execution Environments [PDF]

open access: bronzeProceedings of the 6th Workshop on System Software for Trusted Execution, 2023
Carsten Weinhold   +3 more
openalex   +2 more sources

Teechan: Payment Channels Using Trusted Execution Environments

open access: green, 2016
Blockchain protocols are inherently limited in transaction throughput and latency. Recent efforts to address performance and scale blockchains have focused on off-chain payment channels. While such channels can achieve low latency and high throughput, deploying them securely on top of the Bitcoin blockchain has been difficult, partly because building a
Joshua Lind   +3 more
openalex   +5 more sources

ROLQ-TEE: Revocable and Privacy-Preserving Optimal Location Query Based on Trusted Execution Environment

open access: goldApplied Sciences
With the advent of cloud computing, outsourced computing has emerged as an increasingly popular strategy to reduce the burden of local computation. Optimal location query (OLQ) is a computationally intensive task in the domain of big data outsourcing ...
Bao Li   +5 more
doaj   +2 more sources

Distributed Privacy Protection Data Search Scheme [PDF]

open access: yesJisuanji kexue, 2022
Aiming at the problem of data island caused by high-sensitivity data in the cloud,which makes the data unable to search,discover and share with each other,a distributed privacy protection data search scheme is proposed to realize the two-way ...
LIU Ming-da, SHI Yi-juan, RAO Xiang, FAN Lei
doaj   +1 more source

IceClave: A Trusted Execution Environment for In-Storage Computing [PDF]

open access: yesMICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021
11 pages.
Weiwei Jia   +9 more
openaire   +3 more sources

A survey on the (in)security of trusted execution environments

open access: yesComputers & Security, 2023
As the number of security and privacy attacks continue to grow around the world, there is an ever increasing need to protect our personal devices. As a matter of fact, more and more manufactures are relying on Trusted Execution Environments (TEEs) to shield their devices.
Antonio Muñoz   +3 more
openaire   +3 more sources

Application progress of SGX in trusted computing area

open access: yes网络与信息安全学报, 2021
The trusted computing technology SGX protects the confidentiality and integrity of key codes and data by isolating a trusted execution environment, which can help prevent all kinds of attacks. Firstly, the research background and working principle of SGX
ZHAO Bo, YUAN Anqi, AN Yang
doaj   +3 more sources

MeetGo: A Trusted Execution Environment for Remote Applications on FPGA

open access: yesIEEE Access, 2021
Remote computing has emerged as a trendy computing model that enables users to process an immense number of computations efficiently on the remote server where the necessary data and high-performance computing power are provisioned.
Hyunyoung Oh   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy