Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

User authentication using Blockchain based smart contract in role-based access control

P Kamboj, S Khare, S Pal - Peer-to-Peer Networking and Applications, 2021 - Springer
Since the last few decades, information security has become a significant challenge for
organizations' system administrators. However, the Role-Based Access Control (RBAC) …

Aggregating crowd wisdom via blockchain: A private, correct, and robust realization

H Duan, Y Zheng, Y Du, A Zhou… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Crowdsensing, driven by the proliferation of sensor-rich mobile devices, has emerged as a
promising data sensing and aggregation paradigm. Despite useful, traditional crowdsensing …

Nexus: Practical and secure access control on untrusted storage platforms using client-side sgx

JB Djoko, J Lange, AJ Lee - 2019 49th Annual IEEE/IFIP …, 2019 - ieeexplore.ieee.org
With the rising popularity of file-sharing services such as Google Drive and Dropbox in the
workflows of individuals and corporations alike, the protection of client-outsourced data from …

Anonymous and confidential file sharing over untrusted clouds

S Contiu, S Vaucher, R Pires, M Pasin… - … 38th Symposium on …, 2019 - ieeexplore.ieee.org
Using public cloud services for storing and sharing confidential data requires end users to
cryptographically protect both the data and the access to the data. In some cases, the …

SeGShare: Secure group file sharing in the cloud using enclaves

B Fuhry, L Hirschoff, S Koesnadi… - 2020 50th Annual …, 2020 - ieeexplore.ieee.org
File sharing applications using cloud storage are increasingly popular for personal and
business use. Due to data protection concerns, end-to-end encryption is often a desired …

Post-quantum forward-secure signatures with hardware-support for internet of things

SE Nouma, AA Yavuz - ICC 2023-IEEE International …, 2023 - ieeexplore.ieee.org
Digital signatures provide scalable authentication with non-repudiation and therefore are
vital tools for the Internet of Things (IoT). IoT applications harbor vast quantities of low-end …

Quick boot of trusted execution environment with hardware accelerators

TT Hoang, C Duran, DT Nguyen-Hoang, DH Le… - IEEE …, 2020 - ieeexplore.ieee.org
The Trusted Execution Environment (TEE) offers a software platform for secure applications.
The TEE offers a memory isolation scheme and software authentication from a high privilege …

Smile: Secure memory introspection for live enclave

L Zhou, X Ding, F Zhang - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
SGX enclaves prevent external software from accessing their memory. This feature conflicts
with legitimate needs for enclave memory introspection, eg, runtime stack collection on an …

SCB: Flexible and efficient asymmetric computations utilizing symmetric cryptosystems implemented with Intel SGX

W Ouyang, Q Wang, W Wang, J Lin… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
The wide spread of cloud computing and the rapid growth of online activities raise the
demand for privacy enhancing cryptography, such as identity-based encryption (IBE) …