Artículos de revistas sobre el tema "Trusted Execution Environment (TEE)"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Trusted Execution Environment (TEE)".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Kato, Fumiyuki, Yang Cao y Mastoshi Yoshikawa. "PCT-TEE: Trajectory-based Private Contact Tracing System with Trusted Execution Environment". ACM Transactions on Spatial Algorithms and Systems 8, n.º 2 (30 de junio de 2022): 1–35. http://dx.doi.org/10.1145/3490491.
Texto completoNg, Lucien K. L., Sherman S. M. Chow, Anna P. Y. Woo, Donald P. H. Wong y Yongjun Zhao. "Goten: GPU-Outsourcing Trusted Execution of Neural Network Training". Proceedings of the AAAI Conference on Artificial Intelligence 35, n.º 17 (18 de mayo de 2021): 14876–83. http://dx.doi.org/10.1609/aaai.v35i17.17746.
Texto completoMeftah, Souhail, Shuhao Zhang, Bharadwaj Veeravalli y Khin Mi Mi Aung. "Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments". Algorithms 15, n.º 6 (25 de mayo de 2022): 183. http://dx.doi.org/10.3390/a15060183.
Texto completoKhurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam y Shahid Raza. "TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices". Security and Communication Networks 2022 (25 de mayo de 2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.
Texto completoChen, Yuehai, Huarun Chen, Shaozhen Chen, Chao Han, Wujian Ye, Yijun Liu y Huihui Zhou. "DITES: A Lightweight and Flexible Dual-Core Isolated Trusted Execution SoC Based on RISC-V". Sensors 22, n.º 16 (10 de agosto de 2022): 5981. http://dx.doi.org/10.3390/s22165981.
Texto completoSebastian, D. Jonathan, Utkarsh Agrawal, Ali Tamimi y Adam Hahn. "DER-TEE: Secure Distributed Energy Resource Operations Through Trusted Execution Environments". IEEE Internet of Things Journal 6, n.º 4 (agosto de 2019): 6476–86. http://dx.doi.org/10.1109/jiot.2019.2909768.
Texto completoSong, Weiqiong, Shuai Guo, Jiwei Li, Heng Liu, Zaijun Wu, Xiaorong He y Yunyang Hou. "Security Authentication Framework Design for Electric Internet of Things". Journal of Physics: Conference Series 2356, n.º 1 (1 de octubre de 2022): 012003. http://dx.doi.org/10.1088/1742-6596/2356/1/012003.
Texto completoWang, Zhihong, Yongbiao Li, Dingcheng Li, Ming Li, Bincheng Zhang, Shishi Huang y Wen He. "Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach". Security and Communication Networks 2021 (12 de noviembre de 2021): 1–11. http://dx.doi.org/10.1155/2021/9678409.
Texto completoNoh, Yoongdoo y Chanik Park. "CrossPay: A TEE (Trusted Execution Environment)-based Offchain Protocol for Real-Time Cross Chain Asset Transfer". KIISE Transactions on Computing Practices 28, n.º 3 (31 de marzo de 2022): 160–74. http://dx.doi.org/10.5626/ktcp.2022.28.3.160.
Texto completoLi, Rujia, Qin Wang, Qi Wang, David Galindo y Mark Ryan. "SoK: TEE-Assisted Confidential Smart Contract". Proceedings on Privacy Enhancing Technologies 2022, n.º 3 (julio de 2022): 711–31. http://dx.doi.org/10.56553/popets-2022-0093.
Texto completoChoi, Joseph I. y Kevin R. B. Butler. "Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities". Security and Communication Networks 2019 (2 de abril de 2019): 1–28. http://dx.doi.org/10.1155/2019/1368905.
Texto completoLiu, Songran, Nan Guan, Zhishan Guo y Wang Yi. "MiniTEE—A Lightweight TrustZone-Assisted TEE for Real-Time Systems". Electronics 9, n.º 7 (11 de julio de 2020): 1130. http://dx.doi.org/10.3390/electronics9071130.
Texto completoKoutroumpouchos, Nikolaos, Christoforos Ntantogian y Christos Xenakis. "Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone". Sensors 21, n.º 2 (13 de enero de 2021): 520. http://dx.doi.org/10.3390/s21020520.
Texto completoLe, Duc V., Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee y Aniket Kate. "A Tale of Two Trees: One Writes, and Other Reads". Proceedings on Privacy Enhancing Technologies 2020, n.º 2 (1 de abril de 2020): 519–36. http://dx.doi.org/10.2478/popets-2020-0039.
Texto completoNiu, Yue, Ramy E. Ali y Salman Avestimehr. "3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs". Proceedings on Privacy Enhancing Technologies 2022, n.º 4 (octubre de 2022): 183–203. http://dx.doi.org/10.56553/popets-2022-0105.
Texto completoZhang, Meiyu, Qianying Zhang, Shijun Zhao, Zhiping Shi y Yong Guan. "SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks". Security and Communication Networks 2019 (4 de marzo de 2019): 1–12. http://dx.doi.org/10.1155/2019/8690853.
Texto completoLi, Xinyao y Akhilesh Tyagi. "Cross-World Covert Channel on ARM Trustzone through PMU". Sensors 22, n.º 19 (28 de septiembre de 2022): 7354. http://dx.doi.org/10.3390/s22197354.
Texto completoMo, Fan, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino y Nicolas Kourtellis. "PPFL". GetMobile: Mobile Computing and Communications 25, n.º 4 (30 de marzo de 2022): 35–38. http://dx.doi.org/10.1145/3529706.3529715.
Texto completoYuan, Munan, Xiaofeng Li, Xiru Li, Haibo Tan y Jinlin Xu. "Trust Hardware Based Secured Privacy Preserving Computation System for Three-Dimensional Data". Electronics 10, n.º 13 (25 de junio de 2021): 1546. http://dx.doi.org/10.3390/electronics10131546.
Texto completoJones, Michael, Matthew Johnson, Mark Shervey, Joel T. Dudley y Noah Zimmerman. "Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept". Journal of Medical Internet Research 21, n.º 8 (14 de agosto de 2019): e13600. http://dx.doi.org/10.2196/13600.
Texto completoZhang, Yang, Weijing You, Shijie Jia, Limin Liu, Ziyi Li y Wenfei Qian. "EnclavePoSt: A Practical Proof of Storage-Time in Cloud via Intel SGX". Security and Communication Networks 2022 (4 de mayo de 2022): 1–16. http://dx.doi.org/10.1155/2022/7868502.
Texto completoKim, Seongmin. "An Optimization Methodology for Adapting Legacy SGX Applications to Use Switchless Calls". Applied Sciences 11, n.º 18 (9 de septiembre de 2021): 8379. http://dx.doi.org/10.3390/app11188379.
Texto completoMaliszewski, Kajetan, Jorge-Arnulfo Quiané-Ruiz, Jonas Traub y Volker Markl. "What is the price for joining securely?" Proceedings of the VLDB Endowment 15, n.º 3 (noviembre de 2021): 659–72. http://dx.doi.org/10.14778/3494124.3494146.
Texto completoWang, Sheng, Yiran Li, Huorong Li, Feifei Li, Chengjin Tian, Le Su, Yanshan Zhang et al. "Operon". Proceedings of the VLDB Endowment 15, n.º 12 (agosto de 2022): 3332–45. http://dx.doi.org/10.14778/3554821.3554826.
Texto completoMainetti, Luca, Matteo Aprile, Emanuele Mele y Roberto Vergallo. "A Sustainable Approach to Delivering Programmable Peer-to-Peer Offline Payments". Sensors 23, n.º 3 (25 de enero de 2023): 1336. http://dx.doi.org/10.3390/s23031336.
Texto completoSun, Yuanyuan, Sheng Wang, Huorong Li y Feifei Li. "Building enclave-native storage engines for practical encrypted databases". Proceedings of the VLDB Endowment 14, n.º 6 (febrero de 2021): 1019–32. http://dx.doi.org/10.14778/3447689.3447705.
Texto completoWang, Lianhai, Lingyun Meng, Fengkai Liu, Wei Shao, Kunlun Fu, Shujiang Xu y Shuhui Zhang. "A User-Centered Medical Data Sharing Scheme for Privacy-Preserving Machine Learning". Security and Communication Networks 2022 (30 de septiembre de 2022): 1–16. http://dx.doi.org/10.1155/2022/3670107.
Texto completoOstrak, Andre, Jaak Randmets, Ville Sokk, Sven Laur y Liina Kamm. "Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification". Cryptography 5, n.º 3 (20 de agosto de 2021): 21. http://dx.doi.org/10.3390/cryptography5030021.
Texto completoHuang, Anbu, Yang Liu, Tianjian Chen, Yongkai Zhou, Quan Sun, Hongfeng Chai y Qiang Yang. "StarFL: Hybrid Federated Learning Architecture for Smart Urban Computing". ACM Transactions on Intelligent Systems and Technology 12, n.º 4 (agosto de 2021): 1–23. http://dx.doi.org/10.1145/3467956.
Texto completoAlam, A. K. M. Mubashwir, Sagar Sharma y Keke Chen. "SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications". Proceedings on Privacy Enhancing Technologies 2021, n.º 1 (1 de enero de 2021): 5–20. http://dx.doi.org/10.2478/popets-2021-0002.
Texto completoKumarathunga, Malni, Rodrigo N. Calheiros y Athula Ginige. "Smart Agricultural Futures Market: Blockchain Technology as a Trust Enabler between Smallholder Farmers and Buyers". Sustainability 14, n.º 5 (2 de marzo de 2022): 2916. http://dx.doi.org/10.3390/su14052916.
Texto completoPhilip, Jithu y Merin Raju. "Security Impact of Trusted Execution Environment in Rich Execution Environment Based Systems". Indian Journal of Computer Science 5, n.º 4&5 (1 de octubre de 2020): 26. http://dx.doi.org/10.17010/ijcs/2020/v5/i4-5/154785.
Texto completoS, Prabhav, Madhav V. Deshpande, Rakshak R. Kamath, Rohan N y Latha NR. "Trusted Execution Environment and Linux A Survey". International Journal of Computer Trends and Technology 45, n.º 1 (25 de marzo de 2017): 28–32. http://dx.doi.org/10.14445/22312803/ijctt-v45p105.
Texto completoZhang, Denghui, Lijing Ren y Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing". Applied Sciences 12, n.º 18 (14 de septiembre de 2022): 9191. http://dx.doi.org/10.3390/app12189191.
Texto completoLi, Mingyu, Yubin Xia y Haibo Chen. "Memory Optimization System for SGXv2 Trusted Execution Environment". International Journal of Software and Informatics 12, n.º 3 (2022): 285–307. http://dx.doi.org/10.21655/ijsi.1673-7288.00287.
Texto completoZou, Deqing, Weide Zheng, Jinjiu Long, Hai Jin y Xueguang Chen. "Constructing trusted virtual execution environment in P2P grids". Future Generation Computer Systems 26, n.º 5 (mayo de 2010): 769–75. http://dx.doi.org/10.1016/j.future.2009.05.020.
Texto completoDrozdovskyi, Taras y Oleksandr Moliavko. "mTower: Trusted Execution Environment for MCU-based devices". Journal of Open Source Software 4, n.º 40 (27 de agosto de 2019): 1494. http://dx.doi.org/10.21105/joss.01494.
Texto completoXu, Peng, Ruijie Sun, Wei Wang, Tianyang Chen, Yubo Zheng y Hai Jin. "SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment". Future Generation Computer Systems 125 (diciembre de 2021): 32–40. http://dx.doi.org/10.1016/j.future.2021.06.034.
Texto completoSUZAKI, Kuniyasu. "Implementation of Trusted Execution Environment and Its Supporting Technologies". IEICE ESS Fundamentals Review 14, n.º 2 (1 de octubre de 2020): 107–17. http://dx.doi.org/10.1587/essfr.14.2_107.
Texto completoLee, Unsung y Chanik Park. "SofTEE: Software-Based Trusted Execution Environment for User Applications". IEEE Access 8 (2020): 121874–88. http://dx.doi.org/10.1109/access.2020.3006703.
Texto completoJang, Jinsoo y Brent Byunghoon Kang. "Securing a communication channel for the trusted execution environment". Computers & Security 83 (junio de 2019): 79–92. http://dx.doi.org/10.1016/j.cose.2019.01.012.
Texto completoHoang, Trong-Thuc, Ckristian Duran, Duc-Thinh Nguyen-Hoang, Duc-Hung Le, Akira Tsukamoto, Kuniyasu Suzaki y Cong-Kha Pham. "Quick Boot of Trusted Execution Environment With Hardware Accelerators". IEEE Access 8 (2020): 74015–23. http://dx.doi.org/10.1109/access.2020.2987617.
Texto completoFan, Yongkai, Shengle Liu, Gang Tan y Fei Qiao. "Fine-grained access control based on Trusted Execution Environment". Future Generation Computer Systems 109 (agosto de 2020): 551–61. http://dx.doi.org/10.1016/j.future.2018.05.062.
Texto completoOh, Hyunyoung, Kevin Nam, Seongil Jeon, Yeongpil Cho y Yunheung Paek. "MeetGo: A Trusted Execution Environment for Remote Applications on FPGA". IEEE Access 9 (2021): 51313–24. http://dx.doi.org/10.1109/access.2021.3069223.
Texto completoLiang, Yihuai, Yan Li y Byeong-Seok Shin. "FairCs—Blockchain-Based Fair Crowdsensing Scheme using Trusted Execution Environment". Sensors 20, n.º 11 (3 de junio de 2020): 3172. http://dx.doi.org/10.3390/s20113172.
Texto completoSun, Haiyong y Hang Lei. "A Design and Verification Methodology for a TrustZone Trusted Execution Environment". IEEE Access 8 (2020): 33870–83. http://dx.doi.org/10.1109/access.2020.2974487.
Texto completoPinto, Sandro, Tiago Gomes, Jorge Pereira, Jorge Cabral y Adriano Tavares. "IIoTEED: An Enhanced, Trusted Execution Environment for Industrial IoT Edge Devices". IEEE Internet Computing 21, n.º 1 (enero de 2017): 40–47. http://dx.doi.org/10.1109/mic.2017.17.
Texto completoDai, Weiqi, Hai Jin, Deqing Zou, Shouhuai Xu, Weide Zheng, Lei Shi y Laurence Tianruo Yang. "TEE: A virtual DRTM based execution environment for secure cloud-end computing". Future Generation Computer Systems 49 (agosto de 2015): 47–57. http://dx.doi.org/10.1016/j.future.2014.08.005.
Texto completoWang, Hai, Lu Cai, Xuan Hao, Jie Ren y Yuhui Ma. "ETS-TEE: An Energy-Efficient Task Scheduling Strategy in a Mobile Trusted Computing Environment". Tsinghua Science and Technology 28, n.º 1 (febrero de 2023): 105–16. http://dx.doi.org/10.26599/tst.2021.9010088.
Texto completoHuang, Qi-Xian, Min-Yi Chiu, Chi-Shen Yeh y Hung-Min Sun. "STBEAT: Software Update on Trusted Environment Based on ARM TrustZone". Sustainability 14, n.º 20 (21 de octubre de 2022): 13660. http://dx.doi.org/10.3390/su142013660.
Texto completo