Journal articles on the topic 'Trusted Execution Environment (TEE)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Trusted Execution Environment (TEE).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wen, Sheng, Liam Xu, Liwei Tian, Suping Liu, and Yong Ding. "TeeDFuzzer: Fuzzing Trusted Execution Environment." Electronics 14, no. 8 (2025): 1674. https://doi.org/10.3390/electronics14081674.
Full textLiu, Yanling, and Yun Li. "The Current Situation and Trends of Trusted Execution Environment Applications." Proceedings of Business and Economic Studies 8, no. 2 (2025): 121–26. https://doi.org/10.26689/pbes.v8i2.10296.
Full textSubramanyan, Bala. "Object Capability Model for Tee: A Cheri Based Compartmentalization Approach." International Journal of Security, Privacy and Trust Management 12, no. 3/4 (2023): 23–30. http://dx.doi.org/10.5121/ijsptm.2023.12402.
Full textAbhilash, Kayyidavazhiyil, and Kaipacheri Sheena. "Trusted Execution Environments for Internet of Things Devices." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 11, no. 6 (2022): 45–48. https://doi.org/10.35940/ijitee.F9885.0511622.
Full textLiao, Jia, Baihui Jiang, Peng Zhao, Lei Ning, and Liming Chen. "Unmanned Aerial Vehicle-Assisted Federated Learning Method Based on a Trusted Execution Environment." Electronics 12, no. 18 (2023): 3938. http://dx.doi.org/10.3390/electronics12183938.
Full textZhu, Hongyu, Yubo Song, Yang Li, et al. "Mitigating Randomness Leakage in SM2 White-Box Implementations via Trusted Execution Environments." Electronics 14, no. 2 (2025): 301. https://doi.org/10.3390/electronics14020301.
Full textLiu, Xiaoqing, Yingxu Lai, Jing Liu, and Shiyao Luo. "TZEAMM: An Efficient and Secure Active Measurement Method Based on TrustZone." Security and Communication Networks 2023 (January 31, 2023): 1–18. http://dx.doi.org/10.1155/2023/6921960.
Full textKato, Fumiyuki, Yang Cao, and Masatoshi Yoshikawa. "Olive: Oblivious Federated Learning on Trusted Execution Environment against the Risk of Sparsification." Proceedings of the VLDB Endowment 16, no. 10 (2023): 2404–17. http://dx.doi.org/10.14778/3603581.3603583.
Full textPereira, Sérgio, Tiago Gomes, Jorge Cabral, and Sandro Pinto. "TREE: Bridging the gap between reconfigurable computing and secure execution." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 3 (2025): 115–38. https://doi.org/10.46586/tches.v2025.i3.115-138.
Full textKieu-Do-Nguyen, Binh, Khai-Duy Nguyen, Tuan-Kiet Dang, et al. "A Trusted Execution Environment RISC-V System-on-Chip Compatible with Transport Layer Security 1.3." Electronics 13, no. 13 (2024): 2508. http://dx.doi.org/10.3390/electronics13132508.
Full textLi, Jun, Xinman Luo, and Hong Lei. "TrustHealth: Enhancing eHealth Security with Blockchain and Trusted Execution Environments." Electronics 13, no. 12 (2024): 2425. http://dx.doi.org/10.3390/electronics13122425.
Full textKato, Fumiyuki, Yang Cao, and Mastoshi Yoshikawa. "PCT-TEE: Trajectory-based Private Contact Tracing System with Trusted Execution Environment." ACM Transactions on Spatial Algorithms and Systems 8, no. 2 (2022): 1–35. http://dx.doi.org/10.1145/3490491.
Full textGao, Haotian, Cong Yue, Tien Tuan Anh Dinh, Zhiyong Huang, and Beng Chin Ooi. "Enabling Secure and Efficient Data Analytics Pipeline Evolution with Trusted Execution Environment." Proceedings of the VLDB Endowment 16, no. 10 (2023): 2485–98. http://dx.doi.org/10.14778/3603581.3603589.
Full textNg, Lucien K. L., Sherman S. M. Chow, Anna P. Y. Woo, Donald P. H. Wong, and Yongjun Zhao. "Goten: GPU-Outsourcing Trusted Execution of Neural Network Training." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 17 (2021): 14876–83. http://dx.doi.org/10.1609/aaai.v35i17.17746.
Full textMeftah, Souhail, Shuhao Zhang, Bharadwaj Veeravalli, and Khin Mi Mi Aung. "Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments." Algorithms 15, no. 6 (2022): 183. http://dx.doi.org/10.3390/a15060183.
Full textKhurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam, and Shahid Raza. "TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices." Security and Communication Networks 2022 (May 25, 2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.
Full textLi, Bao, Fucai Zhou, Jian Xu, Qiang Wang, Jiacheng Li, and Da Feng. "ROLQ-TEE: Revocable and Privacy-Preserving Optimal Location Query Based on Trusted Execution Environment." Applied Sciences 15, no. 3 (2025): 1641. https://doi.org/10.3390/app15031641.
Full textChen, Yuehai, Huarun Chen, Shaozhen Chen, et al. "DITES: A Lightweight and Flexible Dual-Core Isolated Trusted Execution SoC Based on RISC-V." Sensors 22, no. 16 (2022): 5981. http://dx.doi.org/10.3390/s22165981.
Full textSasy, Sajin, Aaron Johnson, and Ian Goldberg. "TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 56–75. https://doi.org/10.56553/popets-2025-0119.
Full textJiang, Weijin, En Li, Wenying Zhou, Ying Yang, and Tiantian Luo. "IoT Access Control Model Based on Blockchain and Trusted Execution Environment." Processes 11, no. 3 (2023): 723. http://dx.doi.org/10.3390/pr11030723.
Full textZeng, Fanlang, Rui Chang, and Hongjian Liu. "Freesia: Verifying Correctness of TEE Communication with Concurrent Separation Logic." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 2045–67. https://doi.org/10.1145/3728967.
Full textYuan, Jie, Yinghua Shen, Rui Xu, Xinghai Wei, and Dongxiao Liu. "Elevating Security in Migration: An Enhanced Trusted Execution Environment-Based Generic Virtual Remote Attestation Scheme." Information 15, no. 8 (2024): 470. http://dx.doi.org/10.3390/info15080470.
Full textSebastian, D. Jonathan, Utkarsh Agrawal, Ali Tamimi, and Adam Hahn. "DER-TEE: Secure Distributed Energy Resource Operations Through Trusted Execution Environments." IEEE Internet of Things Journal 6, no. 4 (2019): 6476–86. http://dx.doi.org/10.1109/jiot.2019.2909768.
Full textHan, Shumin, Kuixing Shen, Derong Shen, and Chuang Wang. "Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution Environments." Mathematics 12, no. 15 (2024): 2337. http://dx.doi.org/10.3390/math12152337.
Full textZhu, Linkai, Shanwen Hu, Xiaolian Zhu, Changpu Meng, and Maoyi Huang. "Enhancing the Security and Privacy in the IoT Supply Chain Using Blockchain and Federated Learning with Trusted Execution Environment." Mathematics 11, no. 17 (2023): 3759. http://dx.doi.org/10.3390/math11173759.
Full textSong, Weiqiong, Shuai Guo, Jiwei Li, et al. "Security Authentication Framework Design for Electric Internet of Things." Journal of Physics: Conference Series 2356, no. 1 (2022): 012003. http://dx.doi.org/10.1088/1742-6596/2356/1/012003.
Full textWang, Zhiyuan, and Yuezhi Zhou. "Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios." Future Internet 17, no. 1 (2025): 32. https://doi.org/10.3390/fi17010032.
Full textWang, Zhihong, Yongbiao Li, Dingcheng Li, et al. "Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach." Security and Communication Networks 2021 (November 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/9678409.
Full textNoh, Yoongdoo, and Chanik Park. "CrossPay: A TEE (Trusted Execution Environment)-based Offchain Protocol for Real-Time Cross Chain Asset Transfer." KIISE Transactions on Computing Practices 28, no. 3 (2022): 160–74. http://dx.doi.org/10.5626/ktcp.2022.28.3.160.
Full textYan, Jiaxing, Yan Li, Sifan Yin, et al. "An Efficient Greedy Hierarchical Federated Learning Training Method Based on Trusted Execution Environments." Electronics 13, no. 17 (2024): 3548. http://dx.doi.org/10.3390/electronics13173548.
Full textLi, Rujia, Qin Wang, Qi Wang, David Galindo, and Mark Ryan. "SoK: TEE-Assisted Confidential Smart Contract." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 711–31. http://dx.doi.org/10.56553/popets-2022-0093.
Full textMusale, Pratik, and Adam Lee. "Trust TEE?: Exploring the Impact of Trusted Execution Environments on Smart Home Privacy Norms." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 5–23. http://dx.doi.org/10.56553/popets-2023-0067.
Full textChoi, Joseph I., and Kevin R. B. Butler. "Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities." Security and Communication Networks 2019 (April 2, 2019): 1–28. http://dx.doi.org/10.1155/2019/1368905.
Full textWei, WANG, SHAO Yu, DUAN Jia, and ZHANG Zehua. "Privacy-Preserving Computation:A Comprehensive Survey of Methods and Applications." Chinese Computer Sciences Review 1, no. 1 (2023): 1–12. http://dx.doi.org/10.48014/ccsr.20230517001.
Full textWang, Lianhai, Xiaoqian Liu, Wei Shao, et al. "A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates." Symmetry 16, no. 1 (2024): 89. http://dx.doi.org/10.3390/sym16010089.
Full textLiu, Songran, Nan Guan, Zhishan Guo, and Wang Yi. "MiniTEE—A Lightweight TrustZone-Assisted TEE for Real-Time Systems." Electronics 9, no. 7 (2020): 1130. http://dx.doi.org/10.3390/electronics9071130.
Full textKoutroumpouchos, Nikolaos, Christoforos Ntantogian, and Christos Xenakis. "Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone." Sensors 21, no. 2 (2021): 520. http://dx.doi.org/10.3390/s21020520.
Full textFang, Shuya, Qingquan Liu, Fengrui Zhang, Ningyan Chen, and Xin Li. "Application of Internet of Things and Blockchain in Information Security and Privacy Protection of Global Organizations." Journal of Organizational and End User Computing 35, no. 3 (2023): 1–16. http://dx.doi.org/10.4018/joeuc.323192.
Full textYang, Xinying, Cong Yue, Wenhui Zhang, Yang Liu, Beng Chin Ooi, and Jianjun Chen. "SecuDB: An In-Enclave Privacy-Preserving and Tamper-Resistant Relational Database." Proceedings of the VLDB Endowment 17, no. 12 (2024): 3906–19. http://dx.doi.org/10.14778/3685800.3685815.
Full textLe, Duc V., Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, and Aniket Kate. "A Tale of Two Trees: One Writes, and Other Reads." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (2020): 519–36. http://dx.doi.org/10.2478/popets-2020-0039.
Full textNiu, Yue, Ramy E. Ali, and Salman Avestimehr. "3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 183–203. http://dx.doi.org/10.56553/popets-2022-0105.
Full textZhu, Qinyu, Quan Chen, Yichen Liu, Zahid Akhtar, and Kamran Siddique. "Investigating TrustZone: A Comprehensive Analysis." Security and Communication Networks 2023 (April 14, 2023): 1–19. http://dx.doi.org/10.1155/2023/7369634.
Full textReddy, Annapureddy Venkata Sai Kumar, and Gourinath Banda. "ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System." Sensors 24, no. 24 (2024): 8034. https://doi.org/10.3390/s24248034.
Full textZhang, Meiyu, Qianying Zhang, Shijun Zhao, Zhiping Shi, and Yong Guan. "SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks." Security and Communication Networks 2019 (March 4, 2019): 1–12. http://dx.doi.org/10.1155/2019/8690853.
Full textLi, Xinyao, and Akhilesh Tyagi. "Cross-World Covert Channel on ARM Trustzone through PMU." Sensors 22, no. 19 (2022): 7354. http://dx.doi.org/10.3390/s22197354.
Full textLu, Xiaofeng, and Cheng Jiang. "TEEDAG: A High-Throughput Distributed Ledger Based on TEE and Directed Acyclic Graph." Electronics 12, no. 11 (2023): 2393. http://dx.doi.org/10.3390/electronics12112393.
Full textXu, Zihuan, and Lei Chen. "L2chain." Proceedings of the VLDB Endowment 16, no. 4 (2022): 986–99. http://dx.doi.org/10.14778/3574245.3574278.
Full textMo, Fan, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, and Nicolas Kourtellis. "PPFL." GetMobile: Mobile Computing and Communications 25, no. 4 (2022): 35–38. http://dx.doi.org/10.1145/3529706.3529715.
Full textCrocetti, Luca, Pietro Nannipieri, Stefano Di Matteo, and Sergio Saponara. "Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments." Electronics 12, no. 23 (2023): 4843. http://dx.doi.org/10.3390/electronics12234843.
Full textJulian, Anitha, Gerardine Immaculate Mary, S. Selvi, Mayur Rele, and Muthukumaran Vaithianathan. "Blockchain based solutions for privacy-preserving authentication and authorization in networks." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 797–808. http://dx.doi.org/10.47974/jdmsc-1956.
Full text