Добірка наукової літератури з теми "Intel Software Guard eXtensions (SGX)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Intel Software Guard eXtensions (SGX)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Intel Software Guard eXtensions (SGX)"
Fei, Shufan, Zheng Yan, Wenxiu Ding, and Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures." ACM Computing Surveys 54, no. 6 (July 2021): 1–36. http://dx.doi.org/10.1145/3456631.
Повний текст джерелаAlder, Fritz, Jo Van Bulck, Jesse Spielman, David Oswald, and Frank Piessens. "Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments." Digital Threats: Research and Practice 3, no. 2 (June 30, 2022): 1–26. http://dx.doi.org/10.1145/3491264.
Повний текст джерелаYoon, HanJae, and ManHee Lee. "SGXDump: A Repeatable Code-Reuse Attack for Extracting SGX Enclave Memory." Applied Sciences 12, no. 15 (July 29, 2022): 7655. http://dx.doi.org/10.3390/app12157655.
Повний текст джерелаWoo, Sangyeon, Jeho Song, and Sungyong Park. "A Distributed Oracle Using Intel SGX for Blockchain-Based IoT Applications." Sensors 20, no. 9 (May 10, 2020): 2725. http://dx.doi.org/10.3390/s20092725.
Повний текст джерелаSelo, Omar Abou, Maan Haj Rachid, Abdullatif Shikfa, Yongge Wang, and Qutaibah Malluhi. "Private Function Evaluation Using Intel’s SGX." Security and Communication Networks 2020 (September 15, 2020): 1–10. http://dx.doi.org/10.1155/2020/3042642.
Повний текст джерелаZhang, Denghui, and Zhaoquan Gu. "A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX." Wireless Communications and Mobile Computing 2021 (March 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/6660709.
Повний текст джерелаYuan, Munan, Xiaofeng Li, Xiru Li, Haibo Tan, and Jinlin Xu. "Trust Hardware Based Secured Privacy Preserving Computation System for Three-Dimensional Data." Electronics 10, no. 13 (June 25, 2021): 1546. http://dx.doi.org/10.3390/electronics10131546.
Повний текст джерелаYoon, Hyundo, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee, and Junbeom Hur. "SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search." Applied Sciences 10, no. 21 (November 5, 2020): 7842. http://dx.doi.org/10.3390/app10217842.
Повний текст джерелаWu, Tsu-Yang, Liyang Wang, Xinglan Guo, Yeh-Cheng Chen, and Shu-Chuan Chu. "SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing." Sustainability 14, no. 17 (September 5, 2022): 11054. http://dx.doi.org/10.3390/su141711054.
Повний текст джерелаWu, Tsu-Yang, Xinglan Guo, Yeh-Cheng Chen, Saru Kumari, and Chien-Ming Chen. "SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing." Symmetry 14, no. 7 (July 6, 2022): 1393. http://dx.doi.org/10.3390/sym14071393.
Повний текст джерелаДисертації з теми "Intel Software Guard eXtensions (SGX)"
Cardoso, Rodrigo Martins. "Blockchain-based Storage with SGX Clients for Mobile Games." Master's thesis, 2020. http://hdl.handle.net/10362/107383.
Повний текст джерелаNos últimos anos, muitos jogos multijogador para telemóveis com um grande número de utilizadores tornaram-se populares e um excelente exemplo disso é o Pokémon GO. Estes jogos de escala planetária são verdadeiros desafios de engenharia que obrigam a uma arquitetura descentralizada para dar suporte ao tráfego de milhares de jogadores. Os recentes e contínuos avanços tecnológicos dos dispositivos móveis permitem construir smartphones com um poder de computação, armazenamento e processamento gráfico cada vez maiores e melhores, o que atrai um exorbitante número de jogadores/utilizadores a nível global. Ao combinar todas as funcionalidades disponíveis neste tipo de aparelhos (ecrã táctil, sensor de movimento, sistema de localização preciso, entre outros) com a ligação ubíqua à rede são possíveis jogos online ligados ao movimento do dispositivo, jogos multijogador, jogos baseados em localização e lojas de aplicações. Com todas estas capacidades unidas, os jogos de telemóveis inteligentes fornecem uma experiência distinta aos utilizadores e abrem um horizonte de possibilidades não exploradas. Com a expansão do número base de utilizadores móveis, proliferação de smartphones e tablets e o aumento do interesse em jogos móveis multijogador, uma crescente demanda por serviços, tecnologias e arquiteturas para dar suporte a jogos wireless, surge inevitavelmente para dar resposta à dificuldade de suportar de forma centralizada tais jogos de massiva escala. Como uma solução inovadora para esta procura, foi desenhado um modelo que permite a clientes móveis comunicarem com fortes garantias, para suportar carteiras/moedas virtuais, através de transações diretas com outros com confiança e sem a necessidade de uma entidade central reguladora. Para este fim, o sistema pensado é composto por uma rede peer-to-peer onde os clientes utilizam novas extensões presentes nos novos processadores Intel a partir da sexta geração: as Intel Software Guard Extensions. Ao confiar no cliente, que executa de forma isolada código em hardware seguro, é esperado um sistema transacional mais escalável e mais rápido na produção de transações do que os tradicionais atuais.
Частини книг з теми "Intel Software Guard eXtensions (SGX)"
Keerup, Kalmer, Dan Bogdanov, Baldur Kubo, and Per Gunnar Auran. "Privacy-Preserving Analytics, Processing and Data Management." In Big Data in Bioeconomy, 157–68. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71069-9_12.
Повний текст джерелаLeslie-Hurd, Rebekah, Dror Caspi, and Matthew Fernandez. "Verifying Linearizability of Intel® Software Guard Extensions." In Computer Aided Verification, 144–60. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21668-3_9.
Повний текст джерелаGupta, Debayan, Benjamin Mood, Joan Feigenbaum, Kevin Butler, and Patrick Traynor. "Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation." In Financial Cryptography and Data Security, 302–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53357-4_20.
Повний текст джерелаLiang, Xueping, Sachin Shetty, Deepak Tosh, Peter Foytik, and Lingchen Zhang. "Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions." In Information and Communications Security, 304–10. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-89500-0_27.
Повний текст джерелаТези доповідей конференцій з теми "Intel Software Guard eXtensions (SGX)"
Chakrabarti, Somnath, Matthew Hoekstra, Dmitrii Kuvaiskii, and Mona Vij. "Scaling Intel® Software Guard Extensions Applications with Intel® SGX Card." In HASP '19: Workshop on Hardware and Architectural Support for Security and Privacy. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3337167.3337173.
Повний текст джерелаXing, Bin Cedric, Mark Shanahan, and Rebekah Leslie-Hurd. "Intel® Software Guard Extensions (Intel® SGX) Software Support for Dynamic Memory Allocation inside an Enclave." In the Hardware and Architectural Support for Security and Privacy 2016. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2948618.2954330.
Повний текст джерелаValadares, Dalton Cezane Gomes, Matteus Sthefano Leite da Silva, Andrey Elisio Monteiro Brito, and Ewerton Monteiro Salvador. "Achieving Data Dissemination with Security using FIWARE and Intel Software Guard Extensions (SGX)." In 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2018. http://dx.doi.org/10.1109/iscc.2018.8538590.
Повний текст джерелаMcKeen, Frank, Ilya Alexandrovich, Ittai Anati, Dror Caspi, Simon Johnson, Rebekah Leslie-Hurd, and Carlos Rozas. "Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave." In the Hardware and Architectural Support for Security and Privacy 2016. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2948618.2954331.
Повний текст джерелаChakrabarti, Somnath, Rebekah Leslie-Hurd, Mona Vij, Frank McKeen, Carlos Rozas, Dror Caspi, Ilya Alexandrovich, and Ittai Anati. "Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment." In the Hardware and Architectural Support for Security and Privacy. New York, New York, USA: ACM Press, 2017. http://dx.doi.org/10.1145/3092627.3092634.
Повний текст джерелаPires, Rafael Pereira, Pascal Felber, and Marcelo Pasin. "Distributed systems and trusted execution environments: Trade-offs and challenges." In XXXVIII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sbrc_estendido.2020.12412.
Повний текст джерелаWill, Newton C., Tiago Heinrich, Amanda B. Viescinski, and Carlos A. Maziero. "A Trusted Message Bus Built on Top of D-Bus." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19236.
Повний текст джерелаAbdurahiman, Nihal, Ahmad Qadeib alban, abdullatif shikfa, and Qutaibah Malluhi. "Private Function Evaluation Using Intel’s SGX." In Qatar University Annual Research Forum & Exhibition. Qatar University Press, 2020. http://dx.doi.org/10.29117/quarfe.2020.0246.
Повний текст джерелаSchunter, Matthias. "Intel Software Guard Extensions." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2995306.2995307.
Повний текст джерелаPires, Rafael, Marcelo Pasin, Pascal Felber, and Christof Fetzer. "Secure Content-Based Routing Using Intel Software Guard Extensions." In Middleware '16: 17th International Middleware Conference. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2988336.2988346.
Повний текст джерела