A Survey of Published Attacks on Intel SGX A Nilsson, PN Bideh, J Brorsson https://arxiv.org/abs/2006.13598, 2020 | 148 | 2020 |
Evaluating the performance of the OSCORE security protocol in constrained IoT environments M Gunnarsson, J Brorsson, F Palombini, L Seitz, M Tiloca Internet of Things 13, 100333, 2021 | 27 | 2021 |
Papr: Publicly auditable privacy revocation for anonymous credentials J Brorsson, B David, L Gentile, E Pagnin, PS Wagner Cryptographers’ Track at the RSA Conference, 163-190, 2023 | 11 | 2023 |
Guarding the guards: Accountable authorities in vanets J Brorsson, PS Wagner, M Hell 2018 IEEE Vehicular Networking Conference (VNC), 1-4, 2018 | 5 | 2018 |
Dipsauce: efficient private stream aggregation without trusted parties J Brorsson, M Gunnarsson Nordic Conference on Secure IT Systems, 204-222, 2023 | 3 | 2023 |
On the suitability of using SGX for secure key storage in the cloud J Brorsson, PN Bideh, A Nilsson, M Hell Trust, Privacy and Security in Digital Business: 17th International …, 2020 | 2 | 2020 |
Compact object security for the internet of things J Brorsson, M Gunnarsson | 2 | 2016 |
Consistency-or-Die: Consistency for Key Transparency J Brorsson, E Pagnin, B David, PS Wagner Cryptology ePrint Archive, 2024 | | 2024 |