Results 271 to 280 of about 115,293 (296)
Privacy-preserving and verifiable spectral graph analysis in the cloud. [PDF]
Song Y.
europepmc +1 more source
Enabling end-to-end secure federated learning in biomedical research on heterogeneous computing environments with APPFLx. [PDF]
Hoang TH+11 more
europepmc +1 more source
Reliability in Building Blocks for Secure Software. [PDF]
Black PE.
europepmc +1 more source
Ending nuclear weapons, before they end us
ESC Heart Failure, EarlyView.
Kamran Abbasi+22 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Trusted execution environments on mobile devices
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, 2013A trusted execution environment (TEE) is a secure processing environment that is isolated from the normal processing environment where the device operating system and applications run. The first mobile phones with hardware-based TEEs appeared almost a decade ago, and today almost every smartphone and tablet contains a TEE like ARM TrustZone.
Ekberg, Jan-Erik+3 more
openaire +4 more sources
2020
A trusted execution environment (TEE) means a secure area which can guarantee the confidentiality and integrity of the code and data inside of this area. Usually a TEE is an isolated execution environment. It may be implemented as a special secure mode of the main processor, or a TEE could be maintained by a secure coprocessor.
Vincent Zimmer, Jiewen Yao
openaire +2 more sources
A trusted execution environment (TEE) means a secure area which can guarantee the confidentiality and integrity of the code and data inside of this area. Usually a TEE is an isolated execution environment. It may be implemented as a special secure mode of the main processor, or a TEE could be maintained by a secure coprocessor.
Vincent Zimmer, Jiewen Yao
openaire +2 more sources
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
Proceedings 2015 Network and Distributed System Security Symposium, 2015We propose SeCReT to ameliorate this problem. SeCReT is a framework that builds a secure channel between the REE and TEE by enabling REE processes to use session keys in the REE that is regarded as unsafe region. SeCReT provides the session key to a requestor process only when the requestor’s code and control flow integrity are verified. To prevent the
Sun June Kong+4 more
openaire +2 more sources
Quantitative and Qualitative Investigations into Trusted Execution Environments
2021I propose to develop a quantitative and qualitative framework to integrate a Trusted Execution Environment (TEE) into the pipeline of secure computation by combining it with other cryptographic primitives. Such a hybrid framework will utilize mathematical and statistical modeling techniques to decide how to combine TEE and cryptographic primitives and ...
openaire +2 more sources