Shaping the future of Ethereum: Exploring energy consumption in Proof-of-Work and Proof-of-Stake consensus
Ethereum (ETH) is a popular Layer-1 blockchain platform that has been used to create
decentralized applications (dApps) and smart contracts. Ethereum 2.0, or Serenity, is a …
decentralized applications (dApps) and smart contracts. Ethereum 2.0, or Serenity, is a …
Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
SoK: TEE-assisted confidential smart contract
The blockchain-based smart contract lacks privacy since the contract state and instruction
code are exposed to the public. Combining smart-contract execution with Trusted Execution …
code are exposed to the public. Combining smart-contract execution with Trusted Execution …
Bidirectional utilization of blockchain and privacy computing: Issues, progress, and challenges
H Zhang, W Fan, J Wang - Journal of Network and Computer Applications, 2023 - Elsevier
With the rapid development of information technology and the increasing popularity of
personalized services, the flow of users' personal information in the Internet is inevitable …
personalized services, the flow of users' personal information in the Internet is inevitable …
[HTML][HTML] SoK: Privacy-preserving smart contract
The privacy concern in smart contract applications continues to grow, leading to the
proposal of various schemes aimed at developing comprehensive and universally …
proposal of various schemes aimed at developing comprehensive and universally …
A privacy-preserving mobile crowdsensing scheme based on blockchain and trusted execution environment
T Peng, K Guan, J Liu - IEICE TRANSACTIONS on Information and …, 2022 - search.ieice.org
A mobile crowdsensing system (MCS) utilizes a crowd of users to collect large-scale data
using their mobile devices efficiently. The collected data are usually linked with sensitive …
using their mobile devices efficiently. The collected data are usually linked with sensitive …
An automatic-identification-system-based vessel security system
As today's transportation systems have gradually developed into intelligent transportation
systems, the fundamental elements of the system consist of vessels, harbors, and ship-shore …
systems, the fundamental elements of the system consist of vessels, harbors, and ship-shore …
Decentralized translator of trust: Supporting heterogeneous tee for critical infrastructure protection
Trusted execution environment (TEE) technology has found many applications in mitigating
various security risks in an efficient manner, which is attractive for critical infrastructure …
various security risks in an efficient manner, which is attractive for critical infrastructure …
Distributed auditing protocol for untraceable transactions
Data integrity is a property that cloud service providers (CSPs) have focused on. The data
integrity checking is assigned to third-party auditors (TPAs) to avoid invalid data storage in …
integrity checking is assigned to third-party auditors (TPAs) to avoid invalid data storage in …
ETS-TEE: An energy-efficient task scheduling strategy in a mobile trusted computing environment
H Wang, L Cai, X Hao, J Ren… - Tsinghua Science and …, 2022 - ieeexplore.ieee.org
A trusted execution environment (TEE) is a system-on-chip and CPU system with a wide
security solution available on today's Arm application (APP) processors, which dominate the …
security solution available on today's Arm application (APP) processors, which dominate the …