Academic literature on the topic 'Trusted Execution Environments (TEEs)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trusted Execution Environments (TEEs).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Trusted Execution Environments (TEEs)"
Abhilash, Kayyidavazhiyil, and Kaipacheri Sheena. "Trusted Execution Environments for Internet of Things Devices." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 11, no. 6 (2022): 45–48. https://doi.org/10.35940/ijitee.F9885.0511622.
Full textSubramanyan, Bala. "Object Capability Model for Tee: A Cheri Based Compartmentalization Approach." International Journal of Security, Privacy and Trust Management 12, no. 3/4 (2023): 23–30. http://dx.doi.org/10.5121/ijsptm.2023.12402.
Full textWen, Sheng, Liam Xu, Liwei Tian, Suping Liu, and Yong Ding. "TeeDFuzzer: Fuzzing Trusted Execution Environment." Electronics 14, no. 8 (2025): 1674. https://doi.org/10.3390/electronics14081674.
Full textMusale, Pratik, and Adam Lee. "Trust TEE?: Exploring the Impact of Trusted Execution Environments on Smart Home Privacy Norms." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 5–23. http://dx.doi.org/10.56553/popets-2023-0067.
Full textMeftah, Souhail, Shuhao Zhang, Bharadwaj Veeravalli, and Khin Mi Mi Aung. "Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments." Algorithms 15, no. 6 (2022): 183. http://dx.doi.org/10.3390/a15060183.
Full textHan, Shumin, Kuixing Shen, Derong Shen, and Chuang Wang. "Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution Environments." Mathematics 12, no. 15 (2024): 2337. http://dx.doi.org/10.3390/math12152337.
Full textSingh, Jatinder, Jennifer Cobbe, Do Le Quoc, and Zahra Tarkhani. "Enclaves in the Clouds." Queue 18, no. 6 (2020): 78–114. http://dx.doi.org/10.1145/3442632.3448126.
Full textMaliszewski, Kajetan, Jorge-Arnulfo Quiané-Ruiz, Jonas Traub, and Volker Markl. "What is the price for joining securely?" Proceedings of the VLDB Endowment 15, no. 3 (2021): 659–72. http://dx.doi.org/10.14778/3494124.3494146.
Full textCrocetti, Luca, Pietro Nannipieri, Stefano Di Matteo, and Sergio Saponara. "Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments." Electronics 12, no. 23 (2023): 4843. http://dx.doi.org/10.3390/electronics12234843.
Full textKhurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam, and Shahid Raza. "TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices." Security and Communication Networks 2022 (May 25, 2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.
Full textDissertations / Theses on the topic "Trusted Execution Environments (TEEs)"
Cole, Nigel. "Arguing Assurance in Trusted Execution Environments using Goal Structuring Notation." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177923.
Full textDa, Silva Mathieu. "Securing a trusted hardware environment (Trusted Execution Environment)." Thesis, Montpellier, 2018. http://www.theses.fr/2018MONTS053/document.
Full textMishra, Tanmaya. "Parallelizing Trusted Execution Environments for Multicore Hard Real-Time Systems." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/89889.
Full textFischer, Andreas [Verfasser]. "Computing on encrypted data using trusted execution environments / Andreas Fischer." Paderborn : Universitätsbibliothek, 2021. http://d-nb.info/1234058790/34.
Full textElbashir, Khalid. "Trusted Execution Environments for Open vSwitch : A security enabler for the 5G mobile network." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-218070.
Full textSundblad, Anton, and Gustaf Brunberg. "Secure hypervisor versus trusted execution environment : Security analysis for mobile fingerprint identification applications." Thesis, Linköpings universitet, Databas och informationsteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139227.
Full textDhar, Siddharth. "Optimizing TEE Protection by Automatically Augmenting Requirements Specifications." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98730.
Full textLim, Steven. "Recommending TEE-based Functions Using a Deep Learning Model." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104999.
Full textFuhry, Benny [Verfasser], and Frederik [Akademischer Betreuer] Armknecht. "Secure and efficient processing of outsourced data structures using trusted execution environments / Benny Fuhry ; Betreuer: Frederik Armknecht." Mannheim : Universitätsbibliothek Mannheim, 2021. http://d-nb.info/1229835911/34.
Full textArfaoui, Ghada. "Conception de protocoles cryptographiques préservant la vie privée pour les services mobiles sans contact." Thesis, Orléans, 2015. http://www.theses.fr/2015ORLE2013/document.
Full textBooks on the topic "Trusted Execution Environments (TEEs)"
Shepherd, Carlton, and Konstantinos Markantonakis. Trusted Execution Environments. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-55561-9.
Full textShepherd, Carlton. Trusted Execution Environments. Springer International Publishing AG, 2024.
Find full textBook chapters on the topic "Trusted Execution Environments (TEEs)"
Yu, Geunyeol, Seunghyun Chae, Kyungmin Bae, and Sungkun Moon. "Formal Specification of Trusted Execution Environment APIs." In Fundamental Approaches to Software Engineering. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57259-3_5.
Full textSzefer, Jakub. "Trusted Execution Environments." In Principles of Secure Processor Architecture Design. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-031-01760-5_4.
Full textShepherd, Carlton, and Konstantinos Markantonakis. "Trusted World Systems." In Trusted Execution Environments. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-55561-9_6.
Full textShepherd, Carlton, and Konstantinos Markantonakis. "Deployment Issues, Attacks, and Other Challenges." In Trusted Execution Environments. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-55561-9_8.
Full textShepherd, Carlton, and Konstantinos Markantonakis. "Background Material." In Trusted Execution Environments. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-55561-9_2.
Full textShepherd, Carlton, and Konstantinos Markantonakis. "Isolated Hardware Execution Platforms." In Trusted Execution Environments. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-55561-9_4.
Full textShepherd, Carlton, and Konstantinos Markantonakis. "Operating System Controls." In Trusted Execution Environments. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-55561-9_3.
Full textShepherd, Carlton, and Konstantinos Markantonakis. "Building Execution Environments from the Trusted Platform Module." In Trusted Execution Environments. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-55561-9_5.
Full textShepherd, Carlton, and Konstantinos Markantonakis. "Introduction." In Trusted Execution Environments. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-55561-9_1.
Full textShepherd, Carlton, and Konstantinos Markantonakis. "Conclusion." In Trusted Execution Environments. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-55561-9_9.
Full textConference papers on the topic "Trusted Execution Environments (TEEs)"
Radaljac, Teodora, Danko Miladinović, Žarko Stanisavljević, and Pavle Vuletić. "Secure Distributed Computing in Cloud Using Trusted Execution Environments." In 2024 32nd Telecommunications Forum (TELFOR). IEEE, 2024. https://doi.org/10.1109/telfor63250.2024.10819070.
Full textDe Meulemeester, Jesse, Luca Wilke, David Oswald, Thomas Eisenbarth, Ingrid Verbauwhede, and Jo Van Bulck. "BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00104.
Full textD'Onghia, Grazia, Flavio Ciravegna, Giacomo Bruno, Mattin Antartiko Elorza Forcada, Antonio Pastor, and Antonio Lioy. "Securing 5G: Trusted Execution Environments for Centrally Controlled IPsec Integrity." In 2024 IFIP Networking Conference (IFIP Networking). IEEE, 2024. http://dx.doi.org/10.23919/ifipnetworking62109.2024.10619852.
Full textPuddu, Ivan, Moritz Schneider, Daniele Lain, Stefano Boschetto, and Srdjan Čapkun. "On (the Lack of) Code Confidentiality in Trusted Execution Environments." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00259.
Full textBirgersson, Marcus, Cyrille Artho, and Musard Balliu. "Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments." In 2024 IEEE Secure Development Conference (SecDev). IEEE, 2024. http://dx.doi.org/10.1109/secdev61143.2024.00016.
Full textZhao, Ziming, Md Armanuzzaman, Xi Tan, and Zheyuan Ma. "Trusted Execution Environments in Embedded and IoT Systems: A CactiLab Perspective." In 2024 International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 2024. http://dx.doi.org/10.1109/seed61283.2024.00020.
Full textFelde, Hendrik Meyer Zum, and Andrei-Cosmin Aprodu. "MAXPOWR: Memory Attestation and Export in Process-based Trusted Execution Environments." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00030.
Full textZhang, Xiaolei, Zhaoyu Chen, Guangpu Chen, Xinyu Feng, Qingni Shen, and Zhonghai Wu. "RPPFL: Robust and Privacy-Preserving Federated Learning via Trusted Execution Environments." In ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2025. https://doi.org/10.1109/icassp49660.2025.10889398.
Full textLee, Junmo, Seongjun Kim, Sanghyeon Park, and Soo-Mook Moon. "RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments." In 2024 Annual Computer Security Applications Conference (ACSAC). IEEE, 2024. https://doi.org/10.1109/acsac63791.2024.00048.
Full textKumar, Santosh. "A Verifiable Framework using Trusted Execution Environments for Privacy-Preserving Machine Learning." In 2024 International Conference on Engineering and Emerging Technologies (ICEET). IEEE, 2024. https://doi.org/10.1109/iceet65156.2024.10913696.
Full textReports on the topic "Trusted Execution Environments (TEEs)"
Pei, M., H. Tschofenig, D. Thaler, and D. Wheeler. Trusted Execution Environment Provisioning (TEEP) Architecture. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9397.
Full textAkram, Ayaz, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, and Sean Peisert. Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1768054.
Full text