Results 271 to 280 of about 124,809 (301)
How trust shapes individual resilience to natural hazards: a systematic review. [PDF]
Nicholas JP +4 more
europepmc +1 more source
IoT Authentication in Federated Learning: Methods, Challenges, and Future Directions. [PDF]
Badhib A, Alshehri S, Cherif A.
europepmc +1 more source
EnCTN: an enhanced AI-enabled deep learning framework for security enhancement in blockchain transactions. [PDF]
Bhuvaneshwari P +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Building Open Trusted Execution Environments
IEEE Security & Privacy, 2020Trusted execution environments (TEEs) are a growing part of the security ecosystem. Unfortunately, widely available TEEs are hampered by closed designs and a lack of flexibility. We outline the challenges to TEEs, advocate for extensible and portable open TEEs, and detail current efforts.
David Kohlbrenner +4 more
openaire +1 more source
2020
A trusted execution environment (TEE) means a secure area which can guarantee the confidentiality and integrity of the code and data inside of this area. Usually a TEE is an isolated execution environment. It may be implemented as a special secure mode of the main processor, or a TEE could be maintained by a secure coprocessor.
Jiewen Yao, Vincent Zimmer
openaire +1 more source
A trusted execution environment (TEE) means a secure area which can guarantee the confidentiality and integrity of the code and data inside of this area. Usually a TEE is an isolated execution environment. It may be implemented as a special secure mode of the main processor, or a TEE could be maintained by a secure coprocessor.
Jiewen Yao, Vincent Zimmer
openaire +1 more source
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
Proceedings 2015 Network and Distributed System Security Symposium, 2015We propose SeCReT to ameliorate this problem. SeCReT is a framework that builds a secure channel between the REE and TEE by enabling REE processes to use session keys in the REE that is regarded as unsafe region. SeCReT provides the session key to a requestor process only when the requestor’s code and control flow integrity are verified. To prevent the
Jinsoo Jang +4 more
openaire +1 more source
HIGH PERFORMANCE TRUSTED EXECUTION ENVIRONMENT
SAE Technical Paper Series, 2019<title>ABSTRACT</title> <p>This paper explores the construction of a Trusted Execution Environment (TEE) which doesn’t rely on TrustZone or specific processing modes in order to achieve a high-performance operating environment with multiple layers of
openaire +1 more source

