Cited By
View all- Miladinović DMilaković AVukasović MStanisavljević ŽVuletić P(2024)Secure Multiparty Computation Using Secure Virtual MachinesElectronics10.3390/electronics1305099113:5(991)Online publication date: 5-Mar-2024
- Li MYang YChen GYan MZhang YQuek TGao DZhou JCardenas A(2024)SoK: Understanding Design Choices and Pitfalls of Trusted Execution EnvironmentsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3644993(1600-1616)Online publication date: 1-Jul-2024
- Cheng PEykholt KGu ZJamjoom HJayaram KValdez EVerma A(2024)DeTA: Minimizing Data Leaks in Federated Learning via Decentralized and Trustworthy AggregationProceedings of the Nineteenth European Conference on Computer Systems10.1145/3627703.3650082(219-235)Online publication date: 22-Apr-2024
- Show More Cited By