Journal articles on the topic 'Intel Software Guard eXtensions (SGX)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 19 journal articles for your research on the topic 'Intel Software Guard eXtensions (SGX).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Fei, Shufan, Zheng Yan, Wenxiu Ding, and Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures." ACM Computing Surveys 54, no. 6 (July 2021): 1–36. http://dx.doi.org/10.1145/3456631.
Full textAlder, Fritz, Jo Van Bulck, Jesse Spielman, David Oswald, and Frank Piessens. "Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments." Digital Threats: Research and Practice 3, no. 2 (June 30, 2022): 1–26. http://dx.doi.org/10.1145/3491264.
Full textYoon, HanJae, and ManHee Lee. "SGXDump: A Repeatable Code-Reuse Attack for Extracting SGX Enclave Memory." Applied Sciences 12, no. 15 (July 29, 2022): 7655. http://dx.doi.org/10.3390/app12157655.
Full textWoo, Sangyeon, Jeho Song, and Sungyong Park. "A Distributed Oracle Using Intel SGX for Blockchain-Based IoT Applications." Sensors 20, no. 9 (May 10, 2020): 2725. http://dx.doi.org/10.3390/s20092725.
Full textSelo, Omar Abou, Maan Haj Rachid, Abdullatif Shikfa, Yongge Wang, and Qutaibah Malluhi. "Private Function Evaluation Using Intel’s SGX." Security and Communication Networks 2020 (September 15, 2020): 1–10. http://dx.doi.org/10.1155/2020/3042642.
Full textZhang, Denghui, and Zhaoquan Gu. "A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX." Wireless Communications and Mobile Computing 2021 (March 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/6660709.
Full textYuan, Munan, Xiaofeng Li, Xiru Li, Haibo Tan, and Jinlin Xu. "Trust Hardware Based Secured Privacy Preserving Computation System for Three-Dimensional Data." Electronics 10, no. 13 (June 25, 2021): 1546. http://dx.doi.org/10.3390/electronics10131546.
Full textYoon, Hyundo, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee, and Junbeom Hur. "SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search." Applied Sciences 10, no. 21 (November 5, 2020): 7842. http://dx.doi.org/10.3390/app10217842.
Full textWu, Tsu-Yang, Liyang Wang, Xinglan Guo, Yeh-Cheng Chen, and Shu-Chuan Chu. "SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing." Sustainability 14, no. 17 (September 5, 2022): 11054. http://dx.doi.org/10.3390/su141711054.
Full textWu, Tsu-Yang, Xinglan Guo, Yeh-Cheng Chen, Saru Kumari, and Chien-Ming Chen. "SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing." Symmetry 14, no. 7 (July 6, 2022): 1393. http://dx.doi.org/10.3390/sym14071393.
Full textHan, Jiujiang, Yuxiang Zhang, Jian Liu, Ziyuan Li, Ming Xian, Huimei Wang, Feilong Mao, and Yu Chen. "A Blockchain-Based and SGX-Enabled Access Control Framework for IoT." Electronics 11, no. 17 (August 29, 2022): 2710. http://dx.doi.org/10.3390/electronics11172710.
Full textWang, Juan, Yang Yu, Yi Li, Chengyang Fan, and Shirong Hao. "Design and Implementation of Virtual Security Function Based on Multiple Enclaves." Future Internet 13, no. 1 (January 6, 2021): 12. http://dx.doi.org/10.3390/fi13010012.
Full textSpohn, Marco Aurélio, and Mateus Trebien. "Avaliação do Intel Software Guard Extensions via Emulação." Revista de Informática Teórica e Aplicada 25, no. 1 (February 18, 2018): 90. http://dx.doi.org/10.22456/2175-2745.77654.
Full textShih, Dong-Her, Ting-Wei Wu, Ming-Hung Shih, Wei-Cheng Tsai, and David C. Yen. "A Novel Auction Blockchain System with Price Recommendation and Trusted Execution Environment." Mathematics 9, no. 24 (December 13, 2021): 3214. http://dx.doi.org/10.3390/math9243214.
Full textDall, Fergus, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, and Yuval Yarom. "CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks." IACR Transactions on Cryptographic Hardware and Embedded Systems, May 8, 2018, 171–91. http://dx.doi.org/10.46586/tches.v2018.i2.171-191.
Full textHuo, Tianlin, Xiaoni Meng, Wenhao Wang, Chunliang Hao, Pei Zhao, Jian Zhai, and Mingshu Li. "Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX." IACR Transactions on Cryptographic Hardware and Embedded Systems, November 19, 2019, 321–47. http://dx.doi.org/10.46586/tches.v2020.i1.321-347.
Full textGalijatovic, Esma, Maria Eichlseder, Simon Franz Heindl, and Corina Klug. "Integrity of virtual testing for crash protection." Frontiers in Future Transportation 3 (November 30, 2022). http://dx.doi.org/10.3389/ffutr.2022.914489.
Full textYoussef, Qasmaoui, Maleh Yassine, and Abdelkrim Haqiq. "Secure Software Defined Networks Controller Storage using Intel Software Guard Extensions." International Journal of Advanced Computer Science and Applications 11, no. 10 (2020). http://dx.doi.org/10.14569/ijacsa.2020.0111060.
Full textKüçük, Kubilay Ahmet, David Grawrock, and Andrew Martin. "Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves." EURASIP Journal on Information Security 2019, no. 1 (September 5, 2019). http://dx.doi.org/10.1186/s13635-019-0091-5.
Full text