共 50 条
- [1] Using SafeKeeper to Protect Web Passwords COMPANION PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2018 (WWW 2018), 2018, : 159 - 162
- [2] Obscuro: A Bitcoin Mixer using Trusted Execution Environments 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 692 - 701
- [3] DELEGATEE: Brokered Delegation Using Trusted Execution Environments PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1387 - 1403
- [4] A framework for application partitioning using trusted execution environments CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
- [5] Graviton: Trusted Execution Environments on GPUs PROCEEDINGS OF THE 13TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2018, : 681 - 696
- [6] Secure and Efficient Mobile DNN Using Trusted Execution Environments PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 274 - 285
- [7] Time to Rethink: Trust Brokerage Using Trusted Execution Environments TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 181 - 190
- [9] MultiTEE: Distributing Trusted Execution Environments PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1617 - 1629
- [10] Secret Sharing in Pub/Sub Using Trusted Execution Environments DEBS'18: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL CONFERENCE ON DISTRIBUTED AND EVENT-BASED SYSTEMS, 2018, : 28 - 39