Cited By
View all- Santos JValadares DGorgônio KPerkusich A(2024)Mobile Data Security with Attribute-based Encryption and Confidential Computing2024 IEEE International Conference on Consumer Electronics (ICCE)10.1109/ICCE59016.2024.10444176(1-4)Online publication date: 6-Jan-2024
- Bajramovic EFein CFrinken MRösler PFreiling F(2023)LAVA: Log Authentication and Verification AlgorithmDigital Threats: Research and Practice10.1145/36092334:3(1-17)Online publication date: 13-Jul-2023
- Lu DShi MMa XLiu XGuo RZheng TShen YDong XMa J(2023)Smaug: A TEE-Assisted Secured SQLite for Embedded SystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321602020:5(3617-3635)Online publication date: 1-Sep-2023
- Show More Cited By