Journal articles on the topic 'Trusted Execution Environments (TEEs)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Trusted Execution Environments (TEEs).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Meftah, Souhail, Shuhao Zhang, Bharadwaj Veeravalli, and Khin Mi Mi Aung. "Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments." Algorithms 15, no. 6 (May 25, 2022): 183. http://dx.doi.org/10.3390/a15060183.
Full textSingh, Jatinder, Jennifer Cobbe, Do Le Quoc, and Zahra Tarkhani. "Enclaves in the Clouds." Queue 18, no. 6 (December 14, 2020): 78–114. http://dx.doi.org/10.1145/3442632.3448126.
Full textNiu, Yue, Ramy E. Ali, and Salman Avestimehr. "3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 183–203. http://dx.doi.org/10.56553/popets-2022-0105.
Full textKhurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam, and Shahid Raza. "TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices." Security and Communication Networks 2022 (May 25, 2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.
Full textMaliszewski, Kajetan, Jorge-Arnulfo Quiané-Ruiz, Jonas Traub, and Volker Markl. "What is the price for joining securely?" Proceedings of the VLDB Endowment 15, no. 3 (November 2021): 659–72. http://dx.doi.org/10.14778/3494124.3494146.
Full textLiu, Songran, Nan Guan, Zhishan Guo, and Wang Yi. "MiniTEE—A Lightweight TrustZone-Assisted TEE for Real-Time Systems." Electronics 9, no. 7 (July 11, 2020): 1130. http://dx.doi.org/10.3390/electronics9071130.
Full textFei, Shufan, Zheng Yan, Wenxiu Ding, and Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures." ACM Computing Surveys 54, no. 6 (July 2021): 1–36. http://dx.doi.org/10.1145/3456631.
Full textChoi, Joseph I., and Kevin R. B. Butler. "Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities." Security and Communication Networks 2019 (April 2, 2019): 1–28. http://dx.doi.org/10.1155/2019/1368905.
Full textJones, Michael, Matthew Johnson, Mark Shervey, Joel T. Dudley, and Noah Zimmerman. "Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept." Journal of Medical Internet Research 21, no. 8 (August 14, 2019): e13600. http://dx.doi.org/10.2196/13600.
Full textKoutroumpouchos, Nikolaos, Christoforos Ntantogian, and Christos Xenakis. "Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone." Sensors 21, no. 2 (January 13, 2021): 520. http://dx.doi.org/10.3390/s21020520.
Full textKapsoulis, Nikolaos, Alexandros Psychas, Antonios Litke, and Theodora Varvarigou. "Reinforcing SLA Consensus on Blockchain." Computers 10, no. 12 (November 26, 2021): 159. http://dx.doi.org/10.3390/computers10120159.
Full textWang, Yanping, Xiaosong Zhang, Xiaofen Wang, Teng Hu, Peng Lu, and Mingyong Yin. "Security Enhancements for Data-Driven Systems: A Blockchain-Based Trustworthy Data Sharing Scheme." Security and Communication Networks 2022 (October 11, 2022): 1–11. http://dx.doi.org/10.1155/2022/1317626.
Full textWang, Sheng, Yiran Li, Huorong Li, Feifei Li, Chengjin Tian, Le Su, Yanshan Zhang, et al. "Operon." Proceedings of the VLDB Endowment 15, no. 12 (August 2022): 3332–45. http://dx.doi.org/10.14778/3554821.3554826.
Full textKöhler, Jens, and Henry Förster. "Trusted Execution Environments im Fahrzeug." ATZelektronik 11, no. 5 (October 2016): 38–43. http://dx.doi.org/10.1007/s35658-016-0080-0.
Full textKöhler, Jens, and Henry Förster. "Trusted Execution Environments in Vehicles." ATZelektronik worldwide 11, no. 5 (October 2016): 36–41. http://dx.doi.org/10.1007/s38314-016-0074-y.
Full textKohlbrenner, David, Shweta Shinde, Dayeol Lee, Krste Asanovic, and Dawn Song. "Building Open Trusted Execution Environments." IEEE Security & Privacy 18, no. 5 (September 2020): 47–56. http://dx.doi.org/10.1109/msec.2020.2990649.
Full textAnciaux, Nicolas, Luc Bouganim, Philippe Pucheral, lulian Sandu Popa, and Guillaume Scerri. "Personal database security and trusted execution environments." Proceedings of the VLDB Endowment 12, no. 12 (August 2019): 1994–97. http://dx.doi.org/10.14778/3352063.3352118.
Full textJauernig, Patrick, Ahmad-Reza Sadeghi, and Emmanuel Stapf. "Trusted Execution Environments: Properties, Applications, and Challenges." IEEE Security & Privacy 18, no. 2 (March 2020): 56–60. http://dx.doi.org/10.1109/msec.2019.2947124.
Full textSasy, Sajin, and Ian Goldberg. "ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 331–49. http://dx.doi.org/10.2478/popets-2019-0050.
Full textSchwarz, Michael, and Daniel Gruss. "How Trusted Execution Environments Fuel Research on Microarchitectural Attacks." IEEE Security & Privacy 18, no. 5 (September 2020): 18–27. http://dx.doi.org/10.1109/msec.2020.2993896.
Full textAtamli-Reineh, Ahmad, Andrew Paverd, Giuseppe Petracca, and Andrew Martin. "A framework for application partitioning using trusted execution environments." Concurrency and Computation: Practice and Experience 29, no. 23 (April 23, 2017): e4130. http://dx.doi.org/10.1002/cpe.4130.
Full textAlder, Fritz, Jo Van Bulck, Jesse Spielman, David Oswald, and Frank Piessens. "Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments." Digital Threats: Research and Practice 3, no. 2 (June 30, 2022): 1–26. http://dx.doi.org/10.1145/3491264.
Full textEkberg, Jan-Erik, Kari Kostiainen, and N. Asokan. "The Untapped Potential of Trusted Execution Environments on Mobile Devices." IEEE Security & Privacy 12, no. 4 (July 2014): 29–37. http://dx.doi.org/10.1109/msp.2014.38.
Full textCheng, Jieren, Jun Li, Naixue Xiong, Meizhu Chen, Hao Guo, and Xinzhi Yao. "Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments for Blockchain." Computers, Materials & Continua 65, no. 3 (2020): 2247–62. http://dx.doi.org/10.32604/cmc.2020.011668.
Full textSebastian, D. Jonathan, Utkarsh Agrawal, Ali Tamimi, and Adam Hahn. "DER-TEE: Secure Distributed Energy Resource Operations Through Trusted Execution Environments." IEEE Internet of Things Journal 6, no. 4 (August 2019): 6476–86. http://dx.doi.org/10.1109/jiot.2019.2909768.
Full textLiu, Yin, Kijin An, and Eli Tilevich. "RT-Trust: Automated refactoring for different trusted execution environments under real-time constraints." Journal of Computer Languages 56 (February 2020): 100939. http://dx.doi.org/10.1016/j.cola.2019.100939.
Full textLiang, Yihuai, Yan Li, and Byeong-Seok Shin. "FairCs—Blockchain-Based Fair Crowdsensing Scheme using Trusted Execution Environment." Sensors 20, no. 11 (June 3, 2020): 3172. http://dx.doi.org/10.3390/s20113172.
Full textWang, Ziwang, Liang Wang, and Huili Yan. "MA-TEECM: Mutual Anonymous Authentication-Based Credential Migration Technology for Mobile Trusted Execution Environments." IEEE Access 11 (2023): 3680–90. http://dx.doi.org/10.1109/access.2023.3235372.
Full textLee, Junmo, Sanghyeon Park, and Soo-Mook Moon. "Secure Voting System with Sybil Attack Resistance using Probabilistic Quadratic Voting and Trusted Execution Environments." KIISE Transactions on Computing Practices 27, no. 8 (August 31, 2021): 382–87. http://dx.doi.org/10.5626/ktcp.2021.27.8.382.
Full textMarkin, Dmitry Olegovich, Sergey Mikhailovich Makeev, and Thaj Trung Ho. "Security threat level estimation for untrusted software based on TrustZone technology." Proceedings of the Institute for System Programming of the RAS 34, no. 1 (2022): 35–48. http://dx.doi.org/10.15514/ispras-2022-34(1)-3.
Full textBecker, K. F., S. Voges, P. Fruehauf, M. Heimann, S. Nerreter, R. Blank, M. Erdmann, et al. "Implementation of Trusted Manufacturing & AI-based process optimization into microelectronic manufacturing research environments." International Symposium on Microelectronics 2021, no. 1 (October 1, 2021): 000021–25. http://dx.doi.org/10.4071/1085-8024-2021.1.
Full textBrenna, Lars, Isak Sunde Singh, Håvard Dagenborg Johansen, and Dag Johansen. "TFHE-rs: A library for safe and secure remote computing using fully homomorphic encryption and trusted execution environments." Array 13 (March 2022): 100118. http://dx.doi.org/10.1016/j.array.2021.100118.
Full textValadares, Dalton Cezane Gomes, Newton Carlos Will, Jean Caminha, Mirko Barbosa Perkusich, Angelo Perkusich, and Kyller Costa Gorgonio. "Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications." IEEE Access 9 (2021): 80953–69. http://dx.doi.org/10.1109/access.2021.3085524.
Full textLi, Rujia, Qin Wang, Qi Wang, David Galindo, and Mark Ryan. "SoK: TEE-Assisted Confidential Smart Contract." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (July 2022): 711–31. http://dx.doi.org/10.56553/popets-2022-0093.
Full textLaoutaris, Nikolaos, and Costas Iordanou. "What do information centric networks, trusted execution environments, and digital watermarking have to do with privacy, the data economy, and their future?" ACM SIGCOMM Computer Communication Review 51, no. 1 (January 31, 2021): 32–38. http://dx.doi.org/10.1145/3457175.3457181.
Full textWagh, Sameer, Paul Cuff, and Prateek Mittal. "Differentially Private Oblivious RAM." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 64–84. http://dx.doi.org/10.1515/popets-2018-0032.
Full textZhang, Junpeng, Hui Zhu, Fengwei Wang, Jiaqi Zhao, Qi Xu, and Hui Li. "Security and Privacy Threats to Federated Learning: Issues, Methods, and Challenges." Security and Communication Networks 2022 (September 28, 2022): 1–24. http://dx.doi.org/10.1155/2022/2886795.
Full textMo, Fan, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, and Nicolas Kourtellis. "PPFL." GetMobile: Mobile Computing and Communications 25, no. 4 (March 30, 2022): 35–38. http://dx.doi.org/10.1145/3529706.3529715.
Full textBastos, David, José Ribeiro, Fernando Silva, Mário Rodrigues, Carlos Rabadão, Antonio Fernández-Caballero, João Paulo Barraca, Nelson Pacheco Rocha, and António Pereira. "Security Mechanisms of a Mobile Health Application for Promoting Physical Activity among Older Adults." Sensors 21, no. 21 (November 3, 2021): 7323. http://dx.doi.org/10.3390/s21217323.
Full textFischer, Andreas, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum, and Eric Bodden. "Computation on Encrypted Data Using Dataflow Authentication." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–36. http://dx.doi.org/10.1145/3513005.
Full textOstrak, Andre, Jaak Randmets, Ville Sokk, Sven Laur, and Liina Kamm. "Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification." Cryptography 5, no. 3 (August 20, 2021): 21. http://dx.doi.org/10.3390/cryptography5030021.
Full textDarbandi, Mehdi, Hamza Mohammed Ridha Al-Khafaji, Seyed Hamid Hosseini Nasab, Ahmad Qasim Mohammad AlHamad, Beknazarov Zafarjon Ergashevich, and Nima Jafari Navimipour. "Blockchain Systems in Embedded Internet of Things: Systematic Literature Review, Challenges Analysis, and Future Direction Suggestions." Electronics 11, no. 23 (December 4, 2022): 4020. http://dx.doi.org/10.3390/electronics11234020.
Full textMatos, Everton de, and Markku Ahvenjärvi. "seL4 Microkernel for Virtualization Use-Cases: Potential Directions towards a Standard VMM." Electronics 11, no. 24 (December 16, 2022): 4201. http://dx.doi.org/10.3390/electronics11244201.
Full textCurrie, Levern Q., and Eva Wiese. "Mind Perception in a Competitive Human-Robot Interaction Game." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, no. 1 (November 2019): 1957–61. http://dx.doi.org/10.1177/1071181319631284.
Full textSyed, Toqeer Ali, Salman Jan, Muhammad Shoaib Siddiqui, Ali Alzahrani, Adnan Nadeem, Arshad Ali, and Ali Ullah. "CAR-Tourist: An Integrity-Preserved Collaborative Augmented Reality Framework-Tourism as a Use-Case." Applied Sciences 12, no. 23 (November 24, 2022): 12022. http://dx.doi.org/10.3390/app122312022.
Full textGeppert, Tim, Stefan Deml, David Sturzenegger, and Nico Ebert. "Trusted Execution Environments: Applications and Organizational Challenges." Frontiers in Computer Science 4 (July 7, 2022). http://dx.doi.org/10.3389/fcomp.2022.930741.
Full textSchneider, Moritz, Aritra Dhar, Ivan Puddu, Kari Kostiainen, and Srdjan Čapkun. "Composite Enclaves: Towards Disaggregated Trusted Execution." IACR Transactions on Cryptographic Hardware and Embedded Systems, November 19, 2021, 630–56. http://dx.doi.org/10.46586/tches.v2022.i1.630-656.
Full text"Threats and Vulnerabilities to IoT End Devices Architecture and suggested remedies." International Journal of Recent Technology and Engineering 8, no. 6 (March 30, 2020): 5712–18. http://dx.doi.org/10.35940/ijrte.f9469.038620.
Full textNashimoto, Shoei, Daisuke Suzuki, Rei Ueno, and Naofumi Homma. "Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure." IACR Transactions on Cryptographic Hardware and Embedded Systems, November 19, 2021, 28–68. http://dx.doi.org/10.46586/tches.v2022.i1.28-68.
Full textFoley, Patrick, Micah J. Sheller, Brandon Edwards, Sarthak Pati, Walter Riviera, Mansi Sharma, Prakash Narayana Moorthy, et al. "OpenFL: the open federated learning library." Physics in Medicine & Biology, October 5, 2022. http://dx.doi.org/10.1088/1361-6560/ac97d9.
Full text