Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Santos J, Valadares D, Gorgônio K and Perkusich A. (2024). Mobile Data Security with Attribute-based Encryption and Confidential Computing 2024 IEEE International Conference on Consumer Electronics (ICCE). 10.1109/ICCE59016.2024.10444176. 979-8-3503-2413-6. (1-4).

    https://ieeexplore.ieee.org/document/10444176/

  • Bajramovic E, Fein C, Frinken M, Rösler P and Freiling F. (2023). LAVA: Log Authentication and Verification Algorithm. Digital Threats: Research and Practice. 4:3. (1-17). Online publication date: 30-Sep-2023.

    https://doi.org/10.1145/3609233

  • Lu D, Shi M, Ma X, Liu X, Guo R, Zheng T, Shen Y, Dong X and Ma J. Smaug: A TEE-Assisted Secured SQLite for Embedded Systems. IEEE Transactions on Dependable and Secure Computing. 10.1109/TDSC.2022.3216020. 20:5. (3617-3635).

    https://ieeexplore.ieee.org/document/9925569/

  • Kang D and Jo H. TB-Logger: Secure Vehicle Data Logging Method Using Trusted Execution Environment and Blockchain. IEEE Access. 10.1109/ACCESS.2023.3253626. 11. (23282-23292).

    https://ieeexplore.ieee.org/document/10061395/

  • Mishra N, Chakraborty A, Chatterjee U and Mukhopadhyay D. (2023). Time’s a Thief of Memory. Smart Card Research and Advanced Applications. 10.1007/978-3-031-25319-5_1. (3-24).

    https://link.springer.com/10.1007/978-3-031-25319-5_1

  • Khare S and Badholia A. (2022). Analysis of Cloud and Self-Web-Hosting Services Based on Security Parameters. International Journal of Information System Modeling and Design. 13:6. (1-14). Online publication date: 2-Sep-2022.

    https://doi.org/10.4018/IJISMD.297629

  • Wu Y, He L, Shan Y, Zhang P, He M and Yang Z. (2020). TrustyShare: A Sharing Scheme using ARM TrustZone 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 10.1109/TrustCom50675.2020.00239. 978-1-6654-0392-4. (1741-1747).

    https://ieeexplore.ieee.org/document/9343197/

  • Lee S, Jo H, Choi W, Kim H, Park J and Lee D. Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone. IEEE Access. 10.1109/ACCESS.2020.2991431. 8. (81348-81364).

    https://ieeexplore.ieee.org/document/9082664/

  • Busch M, Schlenk R and Heckel H. TEEMo. Proceedings of the 4th Workshop on System Software for Trusted Execution. (1-6).

    https://doi.org/10.1145/3342559.3365339