Articoli di riviste sul tema "Trusted Execution Environment (TEE)"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Trusted Execution Environment (TEE)".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Kato, Fumiyuki, Yang Cao e Mastoshi Yoshikawa. "PCT-TEE: Trajectory-based Private Contact Tracing System with Trusted Execution Environment". ACM Transactions on Spatial Algorithms and Systems 8, n. 2 (30 giugno 2022): 1–35. http://dx.doi.org/10.1145/3490491.
Testo completoNg, Lucien K. L., Sherman S. M. Chow, Anna P. Y. Woo, Donald P. H. Wong e Yongjun Zhao. "Goten: GPU-Outsourcing Trusted Execution of Neural Network Training". Proceedings of the AAAI Conference on Artificial Intelligence 35, n. 17 (18 maggio 2021): 14876–83. http://dx.doi.org/10.1609/aaai.v35i17.17746.
Testo completoMeftah, Souhail, Shuhao Zhang, Bharadwaj Veeravalli e Khin Mi Mi Aung. "Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments". Algorithms 15, n. 6 (25 maggio 2022): 183. http://dx.doi.org/10.3390/a15060183.
Testo completoKhurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam e Shahid Raza. "TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices". Security and Communication Networks 2022 (25 maggio 2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.
Testo completoChen, Yuehai, Huarun Chen, Shaozhen Chen, Chao Han, Wujian Ye, Yijun Liu e Huihui Zhou. "DITES: A Lightweight and Flexible Dual-Core Isolated Trusted Execution SoC Based on RISC-V". Sensors 22, n. 16 (10 agosto 2022): 5981. http://dx.doi.org/10.3390/s22165981.
Testo completoSebastian, D. Jonathan, Utkarsh Agrawal, Ali Tamimi e Adam Hahn. "DER-TEE: Secure Distributed Energy Resource Operations Through Trusted Execution Environments". IEEE Internet of Things Journal 6, n. 4 (agosto 2019): 6476–86. http://dx.doi.org/10.1109/jiot.2019.2909768.
Testo completoSong, Weiqiong, Shuai Guo, Jiwei Li, Heng Liu, Zaijun Wu, Xiaorong He e Yunyang Hou. "Security Authentication Framework Design for Electric Internet of Things". Journal of Physics: Conference Series 2356, n. 1 (1 ottobre 2022): 012003. http://dx.doi.org/10.1088/1742-6596/2356/1/012003.
Testo completoWang, Zhihong, Yongbiao Li, Dingcheng Li, Ming Li, Bincheng Zhang, Shishi Huang e Wen He. "Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach". Security and Communication Networks 2021 (12 novembre 2021): 1–11. http://dx.doi.org/10.1155/2021/9678409.
Testo completoNoh, Yoongdoo, e Chanik Park. "CrossPay: A TEE (Trusted Execution Environment)-based Offchain Protocol for Real-Time Cross Chain Asset Transfer". KIISE Transactions on Computing Practices 28, n. 3 (31 marzo 2022): 160–74. http://dx.doi.org/10.5626/ktcp.2022.28.3.160.
Testo completoLi, Rujia, Qin Wang, Qi Wang, David Galindo e Mark Ryan. "SoK: TEE-Assisted Confidential Smart Contract". Proceedings on Privacy Enhancing Technologies 2022, n. 3 (luglio 2022): 711–31. http://dx.doi.org/10.56553/popets-2022-0093.
Testo completoChoi, Joseph I., e Kevin R. B. Butler. "Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities". Security and Communication Networks 2019 (2 aprile 2019): 1–28. http://dx.doi.org/10.1155/2019/1368905.
Testo completoLiu, Songran, Nan Guan, Zhishan Guo e Wang Yi. "MiniTEE—A Lightweight TrustZone-Assisted TEE for Real-Time Systems". Electronics 9, n. 7 (11 luglio 2020): 1130. http://dx.doi.org/10.3390/electronics9071130.
Testo completoKoutroumpouchos, Nikolaos, Christoforos Ntantogian e Christos Xenakis. "Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone". Sensors 21, n. 2 (13 gennaio 2021): 520. http://dx.doi.org/10.3390/s21020520.
Testo completoLe, Duc V., Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee e Aniket Kate. "A Tale of Two Trees: One Writes, and Other Reads". Proceedings on Privacy Enhancing Technologies 2020, n. 2 (1 aprile 2020): 519–36. http://dx.doi.org/10.2478/popets-2020-0039.
Testo completoNiu, Yue, Ramy E. Ali e Salman Avestimehr. "3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs". Proceedings on Privacy Enhancing Technologies 2022, n. 4 (ottobre 2022): 183–203. http://dx.doi.org/10.56553/popets-2022-0105.
Testo completoZhang, Meiyu, Qianying Zhang, Shijun Zhao, Zhiping Shi e Yong Guan. "SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks". Security and Communication Networks 2019 (4 marzo 2019): 1–12. http://dx.doi.org/10.1155/2019/8690853.
Testo completoLi, Xinyao, e Akhilesh Tyagi. "Cross-World Covert Channel on ARM Trustzone through PMU". Sensors 22, n. 19 (28 settembre 2022): 7354. http://dx.doi.org/10.3390/s22197354.
Testo completoMo, Fan, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino e Nicolas Kourtellis. "PPFL". GetMobile: Mobile Computing and Communications 25, n. 4 (30 marzo 2022): 35–38. http://dx.doi.org/10.1145/3529706.3529715.
Testo completoYuan, Munan, Xiaofeng Li, Xiru Li, Haibo Tan e Jinlin Xu. "Trust Hardware Based Secured Privacy Preserving Computation System for Three-Dimensional Data". Electronics 10, n. 13 (25 giugno 2021): 1546. http://dx.doi.org/10.3390/electronics10131546.
Testo completoJones, Michael, Matthew Johnson, Mark Shervey, Joel T. Dudley e Noah Zimmerman. "Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept". Journal of Medical Internet Research 21, n. 8 (14 agosto 2019): e13600. http://dx.doi.org/10.2196/13600.
Testo completoZhang, Yang, Weijing You, Shijie Jia, Limin Liu, Ziyi Li e Wenfei Qian. "EnclavePoSt: A Practical Proof of Storage-Time in Cloud via Intel SGX". Security and Communication Networks 2022 (4 maggio 2022): 1–16. http://dx.doi.org/10.1155/2022/7868502.
Testo completoKim, Seongmin. "An Optimization Methodology for Adapting Legacy SGX Applications to Use Switchless Calls". Applied Sciences 11, n. 18 (9 settembre 2021): 8379. http://dx.doi.org/10.3390/app11188379.
Testo completoMaliszewski, Kajetan, Jorge-Arnulfo Quiané-Ruiz, Jonas Traub e Volker Markl. "What is the price for joining securely?" Proceedings of the VLDB Endowment 15, n. 3 (novembre 2021): 659–72. http://dx.doi.org/10.14778/3494124.3494146.
Testo completoWang, Sheng, Yiran Li, Huorong Li, Feifei Li, Chengjin Tian, Le Su, Yanshan Zhang et al. "Operon". Proceedings of the VLDB Endowment 15, n. 12 (agosto 2022): 3332–45. http://dx.doi.org/10.14778/3554821.3554826.
Testo completoMainetti, Luca, Matteo Aprile, Emanuele Mele e Roberto Vergallo. "A Sustainable Approach to Delivering Programmable Peer-to-Peer Offline Payments". Sensors 23, n. 3 (25 gennaio 2023): 1336. http://dx.doi.org/10.3390/s23031336.
Testo completoSun, Yuanyuan, Sheng Wang, Huorong Li e Feifei Li. "Building enclave-native storage engines for practical encrypted databases". Proceedings of the VLDB Endowment 14, n. 6 (febbraio 2021): 1019–32. http://dx.doi.org/10.14778/3447689.3447705.
Testo completoWang, Lianhai, Lingyun Meng, Fengkai Liu, Wei Shao, Kunlun Fu, Shujiang Xu e Shuhui Zhang. "A User-Centered Medical Data Sharing Scheme for Privacy-Preserving Machine Learning". Security and Communication Networks 2022 (30 settembre 2022): 1–16. http://dx.doi.org/10.1155/2022/3670107.
Testo completoOstrak, Andre, Jaak Randmets, Ville Sokk, Sven Laur e Liina Kamm. "Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification". Cryptography 5, n. 3 (20 agosto 2021): 21. http://dx.doi.org/10.3390/cryptography5030021.
Testo completoHuang, Anbu, Yang Liu, Tianjian Chen, Yongkai Zhou, Quan Sun, Hongfeng Chai e Qiang Yang. "StarFL: Hybrid Federated Learning Architecture for Smart Urban Computing". ACM Transactions on Intelligent Systems and Technology 12, n. 4 (agosto 2021): 1–23. http://dx.doi.org/10.1145/3467956.
Testo completoAlam, A. K. M. Mubashwir, Sagar Sharma e Keke Chen. "SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications". Proceedings on Privacy Enhancing Technologies 2021, n. 1 (1 gennaio 2021): 5–20. http://dx.doi.org/10.2478/popets-2021-0002.
Testo completoKumarathunga, Malni, Rodrigo N. Calheiros e Athula Ginige. "Smart Agricultural Futures Market: Blockchain Technology as a Trust Enabler between Smallholder Farmers and Buyers". Sustainability 14, n. 5 (2 marzo 2022): 2916. http://dx.doi.org/10.3390/su14052916.
Testo completoPhilip, Jithu, e Merin Raju. "Security Impact of Trusted Execution Environment in Rich Execution Environment Based Systems". Indian Journal of Computer Science 5, n. 4&5 (1 ottobre 2020): 26. http://dx.doi.org/10.17010/ijcs/2020/v5/i4-5/154785.
Testo completoS, Prabhav, Madhav V. Deshpande, Rakshak R. Kamath, Rohan N e Latha NR. "Trusted Execution Environment and Linux A Survey". International Journal of Computer Trends and Technology 45, n. 1 (25 marzo 2017): 28–32. http://dx.doi.org/10.14445/22312803/ijctt-v45p105.
Testo completoZhang, Denghui, Lijing Ren e Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing". Applied Sciences 12, n. 18 (14 settembre 2022): 9191. http://dx.doi.org/10.3390/app12189191.
Testo completoLi, Mingyu, Yubin Xia e Haibo Chen. "Memory Optimization System for SGXv2 Trusted Execution Environment". International Journal of Software and Informatics 12, n. 3 (2022): 285–307. http://dx.doi.org/10.21655/ijsi.1673-7288.00287.
Testo completoZou, Deqing, Weide Zheng, Jinjiu Long, Hai Jin e Xueguang Chen. "Constructing trusted virtual execution environment in P2P grids". Future Generation Computer Systems 26, n. 5 (maggio 2010): 769–75. http://dx.doi.org/10.1016/j.future.2009.05.020.
Testo completoDrozdovskyi, Taras, e Oleksandr Moliavko. "mTower: Trusted Execution Environment for MCU-based devices". Journal of Open Source Software 4, n. 40 (27 agosto 2019): 1494. http://dx.doi.org/10.21105/joss.01494.
Testo completoXu, Peng, Ruijie Sun, Wei Wang, Tianyang Chen, Yubo Zheng e Hai Jin. "SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment". Future Generation Computer Systems 125 (dicembre 2021): 32–40. http://dx.doi.org/10.1016/j.future.2021.06.034.
Testo completoSUZAKI, Kuniyasu. "Implementation of Trusted Execution Environment and Its Supporting Technologies". IEICE ESS Fundamentals Review 14, n. 2 (1 ottobre 2020): 107–17. http://dx.doi.org/10.1587/essfr.14.2_107.
Testo completoLee, Unsung, e Chanik Park. "SofTEE: Software-Based Trusted Execution Environment for User Applications". IEEE Access 8 (2020): 121874–88. http://dx.doi.org/10.1109/access.2020.3006703.
Testo completoJang, Jinsoo, e Brent Byunghoon Kang. "Securing a communication channel for the trusted execution environment". Computers & Security 83 (giugno 2019): 79–92. http://dx.doi.org/10.1016/j.cose.2019.01.012.
Testo completoHoang, Trong-Thuc, Ckristian Duran, Duc-Thinh Nguyen-Hoang, Duc-Hung Le, Akira Tsukamoto, Kuniyasu Suzaki e Cong-Kha Pham. "Quick Boot of Trusted Execution Environment With Hardware Accelerators". IEEE Access 8 (2020): 74015–23. http://dx.doi.org/10.1109/access.2020.2987617.
Testo completoFan, Yongkai, Shengle Liu, Gang Tan e Fei Qiao. "Fine-grained access control based on Trusted Execution Environment". Future Generation Computer Systems 109 (agosto 2020): 551–61. http://dx.doi.org/10.1016/j.future.2018.05.062.
Testo completoOh, Hyunyoung, Kevin Nam, Seongil Jeon, Yeongpil Cho e Yunheung Paek. "MeetGo: A Trusted Execution Environment for Remote Applications on FPGA". IEEE Access 9 (2021): 51313–24. http://dx.doi.org/10.1109/access.2021.3069223.
Testo completoLiang, Yihuai, Yan Li e Byeong-Seok Shin. "FairCs—Blockchain-Based Fair Crowdsensing Scheme using Trusted Execution Environment". Sensors 20, n. 11 (3 giugno 2020): 3172. http://dx.doi.org/10.3390/s20113172.
Testo completoSun, Haiyong, e Hang Lei. "A Design and Verification Methodology for a TrustZone Trusted Execution Environment". IEEE Access 8 (2020): 33870–83. http://dx.doi.org/10.1109/access.2020.2974487.
Testo completoPinto, Sandro, Tiago Gomes, Jorge Pereira, Jorge Cabral e Adriano Tavares. "IIoTEED: An Enhanced, Trusted Execution Environment for Industrial IoT Edge Devices". IEEE Internet Computing 21, n. 1 (gennaio 2017): 40–47. http://dx.doi.org/10.1109/mic.2017.17.
Testo completoDai, Weiqi, Hai Jin, Deqing Zou, Shouhuai Xu, Weide Zheng, Lei Shi e Laurence Tianruo Yang. "TEE: A virtual DRTM based execution environment for secure cloud-end computing". Future Generation Computer Systems 49 (agosto 2015): 47–57. http://dx.doi.org/10.1016/j.future.2014.08.005.
Testo completoWang, Hai, Lu Cai, Xuan Hao, Jie Ren e Yuhui Ma. "ETS-TEE: An Energy-Efficient Task Scheduling Strategy in a Mobile Trusted Computing Environment". Tsinghua Science and Technology 28, n. 1 (febbraio 2023): 105–16. http://dx.doi.org/10.26599/tst.2021.9010088.
Testo completoHuang, Qi-Xian, Min-Yi Chiu, Chi-Shen Yeh e Hung-Min Sun. "STBEAT: Software Update on Trusted Environment Based on ARM TrustZone". Sustainability 14, n. 20 (21 ottobre 2022): 13660. http://dx.doi.org/10.3390/su142013660.
Testo completo