Santos J, Valadares D, Gorgônio K and Perkusich A.
(2024). Mobile Data Security with Attribute-based Encryption and Confidential Computing 2024 IEEE International Conference on Consumer Electronics (ICCE). 10.1109/ICCE59016.2024.10444176. 979-8-3503-2413-6. (1-4).
Bajramovic E, Fein C, Frinken M, Rösler P and Freiling F.
(2023). LAVA: Log Authentication and Verification Algorithm. Digital Threats: Research and Practice. 4:3. (1-17). Online publication date: 30-Sep-2023.
Lu D, Shi M, Ma X, Liu X, Guo R, Zheng T, Shen Y, Dong X and Ma J. Smaug: A TEE-Assisted Secured SQLite for Embedded Systems. IEEE Transactions on Dependable and Secure Computing. 10.1109/TDSC.2022.3216020. 20:5. (3617-3635).
Kang D and Jo H. TB-Logger: Secure Vehicle Data Logging Method Using Trusted Execution Environment and Blockchain. IEEE Access. 10.1109/ACCESS.2023.3253626. 11. (23282-23292).
Khare S and Badholia A.
(2022). Analysis of Cloud and Self-Web-Hosting Services Based on Security Parameters. International Journal of Information System Modeling and Design. 13:6. (1-14). Online publication date: 2-Sep-2022.
Wu Y, He L, Shan Y, Zhang P, He M and Yang Z.
(2020). TrustyShare: A Sharing Scheme using ARM TrustZone 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 10.1109/TrustCom50675.2020.00239. 978-1-6654-0392-4. (1741-1747).
Lee S, Jo H, Choi W, Kim H, Park J and Lee D. Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone. IEEE Access. 10.1109/ACCESS.2020.2991431. 8. (81348-81364).