Статті в журналах з теми "Trusted Execution Environments (TEEs)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Trusted Execution Environments (TEEs)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Meftah, Souhail, Shuhao Zhang, Bharadwaj Veeravalli, and Khin Mi Mi Aung. "Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments." Algorithms 15, no. 6 (May 25, 2022): 183. http://dx.doi.org/10.3390/a15060183.
Повний текст джерелаSingh, Jatinder, Jennifer Cobbe, Do Le Quoc, and Zahra Tarkhani. "Enclaves in the Clouds." Queue 18, no. 6 (December 14, 2020): 78–114. http://dx.doi.org/10.1145/3442632.3448126.
Повний текст джерелаNiu, Yue, Ramy E. Ali, and Salman Avestimehr. "3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 183–203. http://dx.doi.org/10.56553/popets-2022-0105.
Повний текст джерелаKhurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam, and Shahid Raza. "TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices." Security and Communication Networks 2022 (May 25, 2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.
Повний текст джерелаMaliszewski, Kajetan, Jorge-Arnulfo Quiané-Ruiz, Jonas Traub, and Volker Markl. "What is the price for joining securely?" Proceedings of the VLDB Endowment 15, no. 3 (November 2021): 659–72. http://dx.doi.org/10.14778/3494124.3494146.
Повний текст джерелаLiu, Songran, Nan Guan, Zhishan Guo, and Wang Yi. "MiniTEE—A Lightweight TrustZone-Assisted TEE for Real-Time Systems." Electronics 9, no. 7 (July 11, 2020): 1130. http://dx.doi.org/10.3390/electronics9071130.
Повний текст джерелаFei, Shufan, Zheng Yan, Wenxiu Ding, and Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures." ACM Computing Surveys 54, no. 6 (July 2021): 1–36. http://dx.doi.org/10.1145/3456631.
Повний текст джерелаChoi, Joseph I., and Kevin R. B. Butler. "Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities." Security and Communication Networks 2019 (April 2, 2019): 1–28. http://dx.doi.org/10.1155/2019/1368905.
Повний текст джерелаJones, Michael, Matthew Johnson, Mark Shervey, Joel T. Dudley, and Noah Zimmerman. "Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept." Journal of Medical Internet Research 21, no. 8 (August 14, 2019): e13600. http://dx.doi.org/10.2196/13600.
Повний текст джерелаKoutroumpouchos, Nikolaos, Christoforos Ntantogian, and Christos Xenakis. "Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone." Sensors 21, no. 2 (January 13, 2021): 520. http://dx.doi.org/10.3390/s21020520.
Повний текст джерелаKapsoulis, Nikolaos, Alexandros Psychas, Antonios Litke, and Theodora Varvarigou. "Reinforcing SLA Consensus on Blockchain." Computers 10, no. 12 (November 26, 2021): 159. http://dx.doi.org/10.3390/computers10120159.
Повний текст джерелаWang, Yanping, Xiaosong Zhang, Xiaofen Wang, Teng Hu, Peng Lu, and Mingyong Yin. "Security Enhancements for Data-Driven Systems: A Blockchain-Based Trustworthy Data Sharing Scheme." Security and Communication Networks 2022 (October 11, 2022): 1–11. http://dx.doi.org/10.1155/2022/1317626.
Повний текст джерелаWang, Sheng, Yiran Li, Huorong Li, Feifei Li, Chengjin Tian, Le Su, Yanshan Zhang, et al. "Operon." Proceedings of the VLDB Endowment 15, no. 12 (August 2022): 3332–45. http://dx.doi.org/10.14778/3554821.3554826.
Повний текст джерелаKöhler, Jens, and Henry Förster. "Trusted Execution Environments im Fahrzeug." ATZelektronik 11, no. 5 (October 2016): 38–43. http://dx.doi.org/10.1007/s35658-016-0080-0.
Повний текст джерелаKöhler, Jens, and Henry Förster. "Trusted Execution Environments in Vehicles." ATZelektronik worldwide 11, no. 5 (October 2016): 36–41. http://dx.doi.org/10.1007/s38314-016-0074-y.
Повний текст джерелаKohlbrenner, David, Shweta Shinde, Dayeol Lee, Krste Asanovic, and Dawn Song. "Building Open Trusted Execution Environments." IEEE Security & Privacy 18, no. 5 (September 2020): 47–56. http://dx.doi.org/10.1109/msec.2020.2990649.
Повний текст джерелаAnciaux, Nicolas, Luc Bouganim, Philippe Pucheral, lulian Sandu Popa, and Guillaume Scerri. "Personal database security and trusted execution environments." Proceedings of the VLDB Endowment 12, no. 12 (August 2019): 1994–97. http://dx.doi.org/10.14778/3352063.3352118.
Повний текст джерелаJauernig, Patrick, Ahmad-Reza Sadeghi, and Emmanuel Stapf. "Trusted Execution Environments: Properties, Applications, and Challenges." IEEE Security & Privacy 18, no. 2 (March 2020): 56–60. http://dx.doi.org/10.1109/msec.2019.2947124.
Повний текст джерелаSasy, Sajin, and Ian Goldberg. "ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 331–49. http://dx.doi.org/10.2478/popets-2019-0050.
Повний текст джерелаSchwarz, Michael, and Daniel Gruss. "How Trusted Execution Environments Fuel Research on Microarchitectural Attacks." IEEE Security & Privacy 18, no. 5 (September 2020): 18–27. http://dx.doi.org/10.1109/msec.2020.2993896.
Повний текст джерелаAtamli-Reineh, Ahmad, Andrew Paverd, Giuseppe Petracca, and Andrew Martin. "A framework for application partitioning using trusted execution environments." Concurrency and Computation: Practice and Experience 29, no. 23 (April 23, 2017): e4130. http://dx.doi.org/10.1002/cpe.4130.
Повний текст джерелаAlder, Fritz, Jo Van Bulck, Jesse Spielman, David Oswald, and Frank Piessens. "Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments." Digital Threats: Research and Practice 3, no. 2 (June 30, 2022): 1–26. http://dx.doi.org/10.1145/3491264.
Повний текст джерелаEkberg, Jan-Erik, Kari Kostiainen, and N. Asokan. "The Untapped Potential of Trusted Execution Environments on Mobile Devices." IEEE Security & Privacy 12, no. 4 (July 2014): 29–37. http://dx.doi.org/10.1109/msp.2014.38.
Повний текст джерелаCheng, Jieren, Jun Li, Naixue Xiong, Meizhu Chen, Hao Guo, and Xinzhi Yao. "Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments for Blockchain." Computers, Materials & Continua 65, no. 3 (2020): 2247–62. http://dx.doi.org/10.32604/cmc.2020.011668.
Повний текст джерелаSebastian, D. Jonathan, Utkarsh Agrawal, Ali Tamimi, and Adam Hahn. "DER-TEE: Secure Distributed Energy Resource Operations Through Trusted Execution Environments." IEEE Internet of Things Journal 6, no. 4 (August 2019): 6476–86. http://dx.doi.org/10.1109/jiot.2019.2909768.
Повний текст джерелаLiu, Yin, Kijin An, and Eli Tilevich. "RT-Trust: Automated refactoring for different trusted execution environments under real-time constraints." Journal of Computer Languages 56 (February 2020): 100939. http://dx.doi.org/10.1016/j.cola.2019.100939.
Повний текст джерелаLiang, Yihuai, Yan Li, and Byeong-Seok Shin. "FairCs—Blockchain-Based Fair Crowdsensing Scheme using Trusted Execution Environment." Sensors 20, no. 11 (June 3, 2020): 3172. http://dx.doi.org/10.3390/s20113172.
Повний текст джерелаWang, Ziwang, Liang Wang, and Huili Yan. "MA-TEECM: Mutual Anonymous Authentication-Based Credential Migration Technology for Mobile Trusted Execution Environments." IEEE Access 11 (2023): 3680–90. http://dx.doi.org/10.1109/access.2023.3235372.
Повний текст джерелаLee, Junmo, Sanghyeon Park, and Soo-Mook Moon. "Secure Voting System with Sybil Attack Resistance using Probabilistic Quadratic Voting and Trusted Execution Environments." KIISE Transactions on Computing Practices 27, no. 8 (August 31, 2021): 382–87. http://dx.doi.org/10.5626/ktcp.2021.27.8.382.
Повний текст джерелаMarkin, Dmitry Olegovich, Sergey Mikhailovich Makeev, and Thaj Trung Ho. "Security threat level estimation for untrusted software based on TrustZone technology." Proceedings of the Institute for System Programming of the RAS 34, no. 1 (2022): 35–48. http://dx.doi.org/10.15514/ispras-2022-34(1)-3.
Повний текст джерелаBecker, K. F., S. Voges, P. Fruehauf, M. Heimann, S. Nerreter, R. Blank, M. Erdmann, et al. "Implementation of Trusted Manufacturing & AI-based process optimization into microelectronic manufacturing research environments." International Symposium on Microelectronics 2021, no. 1 (October 1, 2021): 000021–25. http://dx.doi.org/10.4071/1085-8024-2021.1.
Повний текст джерелаBrenna, Lars, Isak Sunde Singh, Håvard Dagenborg Johansen, and Dag Johansen. "TFHE-rs: A library for safe and secure remote computing using fully homomorphic encryption and trusted execution environments." Array 13 (March 2022): 100118. http://dx.doi.org/10.1016/j.array.2021.100118.
Повний текст джерелаValadares, Dalton Cezane Gomes, Newton Carlos Will, Jean Caminha, Mirko Barbosa Perkusich, Angelo Perkusich, and Kyller Costa Gorgonio. "Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications." IEEE Access 9 (2021): 80953–69. http://dx.doi.org/10.1109/access.2021.3085524.
Повний текст джерелаLi, Rujia, Qin Wang, Qi Wang, David Galindo, and Mark Ryan. "SoK: TEE-Assisted Confidential Smart Contract." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (July 2022): 711–31. http://dx.doi.org/10.56553/popets-2022-0093.
Повний текст джерелаLaoutaris, Nikolaos, and Costas Iordanou. "What do information centric networks, trusted execution environments, and digital watermarking have to do with privacy, the data economy, and their future?" ACM SIGCOMM Computer Communication Review 51, no. 1 (January 31, 2021): 32–38. http://dx.doi.org/10.1145/3457175.3457181.
Повний текст джерелаWagh, Sameer, Paul Cuff, and Prateek Mittal. "Differentially Private Oblivious RAM." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 64–84. http://dx.doi.org/10.1515/popets-2018-0032.
Повний текст джерелаZhang, Junpeng, Hui Zhu, Fengwei Wang, Jiaqi Zhao, Qi Xu, and Hui Li. "Security and Privacy Threats to Federated Learning: Issues, Methods, and Challenges." Security and Communication Networks 2022 (September 28, 2022): 1–24. http://dx.doi.org/10.1155/2022/2886795.
Повний текст джерелаMo, Fan, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, and Nicolas Kourtellis. "PPFL." GetMobile: Mobile Computing and Communications 25, no. 4 (March 30, 2022): 35–38. http://dx.doi.org/10.1145/3529706.3529715.
Повний текст джерелаBastos, David, José Ribeiro, Fernando Silva, Mário Rodrigues, Carlos Rabadão, Antonio Fernández-Caballero, João Paulo Barraca, Nelson Pacheco Rocha, and António Pereira. "Security Mechanisms of a Mobile Health Application for Promoting Physical Activity among Older Adults." Sensors 21, no. 21 (November 3, 2021): 7323. http://dx.doi.org/10.3390/s21217323.
Повний текст джерелаFischer, Andreas, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum, and Eric Bodden. "Computation on Encrypted Data Using Dataflow Authentication." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–36. http://dx.doi.org/10.1145/3513005.
Повний текст джерелаOstrak, Andre, Jaak Randmets, Ville Sokk, Sven Laur, and Liina Kamm. "Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification." Cryptography 5, no. 3 (August 20, 2021): 21. http://dx.doi.org/10.3390/cryptography5030021.
Повний текст джерелаDarbandi, Mehdi, Hamza Mohammed Ridha Al-Khafaji, Seyed Hamid Hosseini Nasab, Ahmad Qasim Mohammad AlHamad, Beknazarov Zafarjon Ergashevich, and Nima Jafari Navimipour. "Blockchain Systems in Embedded Internet of Things: Systematic Literature Review, Challenges Analysis, and Future Direction Suggestions." Electronics 11, no. 23 (December 4, 2022): 4020. http://dx.doi.org/10.3390/electronics11234020.
Повний текст джерелаMatos, Everton de, and Markku Ahvenjärvi. "seL4 Microkernel for Virtualization Use-Cases: Potential Directions towards a Standard VMM." Electronics 11, no. 24 (December 16, 2022): 4201. http://dx.doi.org/10.3390/electronics11244201.
Повний текст джерелаCurrie, Levern Q., and Eva Wiese. "Mind Perception in a Competitive Human-Robot Interaction Game." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, no. 1 (November 2019): 1957–61. http://dx.doi.org/10.1177/1071181319631284.
Повний текст джерелаSyed, Toqeer Ali, Salman Jan, Muhammad Shoaib Siddiqui, Ali Alzahrani, Adnan Nadeem, Arshad Ali, and Ali Ullah. "CAR-Tourist: An Integrity-Preserved Collaborative Augmented Reality Framework-Tourism as a Use-Case." Applied Sciences 12, no. 23 (November 24, 2022): 12022. http://dx.doi.org/10.3390/app122312022.
Повний текст джерелаGeppert, Tim, Stefan Deml, David Sturzenegger, and Nico Ebert. "Trusted Execution Environments: Applications and Organizational Challenges." Frontiers in Computer Science 4 (July 7, 2022). http://dx.doi.org/10.3389/fcomp.2022.930741.
Повний текст джерелаSchneider, Moritz, Aritra Dhar, Ivan Puddu, Kari Kostiainen, and Srdjan Čapkun. "Composite Enclaves: Towards Disaggregated Trusted Execution." IACR Transactions on Cryptographic Hardware and Embedded Systems, November 19, 2021, 630–56. http://dx.doi.org/10.46586/tches.v2022.i1.630-656.
Повний текст джерела"Threats and Vulnerabilities to IoT End Devices Architecture and suggested remedies." International Journal of Recent Technology and Engineering 8, no. 6 (March 30, 2020): 5712–18. http://dx.doi.org/10.35940/ijrte.f9469.038620.
Повний текст джерелаNashimoto, Shoei, Daisuke Suzuki, Rei Ueno, and Naofumi Homma. "Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure." IACR Transactions on Cryptographic Hardware and Embedded Systems, November 19, 2021, 28–68. http://dx.doi.org/10.46586/tches.v2022.i1.28-68.
Повний текст джерелаFoley, Patrick, Micah J. Sheller, Brandon Edwards, Sarthak Pati, Walter Riviera, Mansi Sharma, Prakash Narayana Moorthy, et al. "OpenFL: the open federated learning library." Physics in Medicine & Biology, October 5, 2022. http://dx.doi.org/10.1088/1361-6560/ac97d9.
Повний текст джерела