Cited By
View all- Yan YMishra PHuang WMehta ABalmau OLie DDing AAral AHilt V(2024)Stream Processing with Adaptive Edge-Enhanced Confidential ComputingProceedings of the 7th International Workshop on Edge Systems, Analytics and Networking10.1145/3642968.3654819(37-42)Online publication date: 22-Apr-2024
- Ahmad AOu BLiu CZhang XFonseca PAamodt TSwift MJerger N(2023)Veil: A Protected Services Framework for Confidential Virtual MachinesProceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 410.1145/3623278.3624763(378-393)Online publication date: 25-Mar-2023
- Ro YJin SHuh JKim JMartínez JDuato JJohn L(2021)Ghost routing to enable oblivious computation on memory-centric networksProceedings of the 48th Annual International Symposium on Computer Architecture10.1109/ISCA52012.2021.00077(930-943)Online publication date: 14-Jun-2021
- Show More Cited By