A comprehensive survey of hardware-assisted security: From the edge to the cloud

L Coppolino, S D'Antonio, G Mazzeo, L Romano - Internet of Things, 2019 - Elsevier
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

[PDF][PDF] A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud

L Coppolinoa, S D'Antonioa, G Mazzeoa, L Romanoa - researchgate.net
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud

L Coppolino, S D'Antonio, G Mazzeo… - INTERNET OF …, 2019 - ricerca.uniparthenope.it
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

[PDF][PDF] A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud

L Coppolinoa, S D'Antonioa, G Mazzeoa, L Romanoa - researchgate.net
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …