Cited By
View all- Miladinović DMilaković AVukasović MStanisavljević ŽVuletić P(2024)Secure Multiparty Computation Using Secure Virtual MachinesElectronics10.3390/electronics1305099113:5(991)Online publication date: 5-Mar-2024
- Zuppelli MGuarascio MCaviglione LLiguori A(2024)No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and SyscallsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670884(1-8)Online publication date: 30-Jul-2024
- Li MYang YChen GYan MZhang YQuek TGao DZhou JCardenas A(2024)SoK: Understanding Design Choices and Pitfalls of Trusted Execution EnvironmentsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3644993(1600-1616)Online publication date: 1-Jul-2024
- Show More Cited By