Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
User authentication using Blockchain based smart contract in role-based access control
Since the last few decades, information security has become a significant challenge for
organizations' system administrators. However, the Role-Based Access Control (RBAC) …
organizations' system administrators. However, the Role-Based Access Control (RBAC) …
Aggregating crowd wisdom via blockchain: A private, correct, and robust realization
Crowdsensing, driven by the proliferation of sensor-rich mobile devices, has emerged as a
promising data sensing and aggregation paradigm. Despite useful, traditional crowdsensing …
promising data sensing and aggregation paradigm. Despite useful, traditional crowdsensing …
Nexus: Practical and secure access control on untrusted storage platforms using client-side sgx
With the rising popularity of file-sharing services such as Google Drive and Dropbox in the
workflows of individuals and corporations alike, the protection of client-outsourced data from …
workflows of individuals and corporations alike, the protection of client-outsourced data from …
Anonymous and confidential file sharing over untrusted clouds
Using public cloud services for storing and sharing confidential data requires end users to
cryptographically protect both the data and the access to the data. In some cases, the …
cryptographically protect both the data and the access to the data. In some cases, the …
SeGShare: Secure group file sharing in the cloud using enclaves
B Fuhry, L Hirschoff, S Koesnadi… - 2020 50th Annual …, 2020 - ieeexplore.ieee.org
File sharing applications using cloud storage are increasingly popular for personal and
business use. Due to data protection concerns, end-to-end encryption is often a desired …
business use. Due to data protection concerns, end-to-end encryption is often a desired …
Post-quantum forward-secure signatures with hardware-support for internet of things
Digital signatures provide scalable authentication with non-repudiation and therefore are
vital tools for the Internet of Things (IoT). IoT applications harbor vast quantities of low-end …
vital tools for the Internet of Things (IoT). IoT applications harbor vast quantities of low-end …
Quick boot of trusted execution environment with hardware accelerators
The Trusted Execution Environment (TEE) offers a software platform for secure applications.
The TEE offers a memory isolation scheme and software authentication from a high privilege …
The TEE offers a memory isolation scheme and software authentication from a high privilege …
Smile: Secure memory introspection for live enclave
SGX enclaves prevent external software from accessing their memory. This feature conflicts
with legitimate needs for enclave memory introspection, eg, runtime stack collection on an …
with legitimate needs for enclave memory introspection, eg, runtime stack collection on an …
SCB: Flexible and efficient asymmetric computations utilizing symmetric cryptosystems implemented with Intel SGX
W Ouyang, Q Wang, W Wang, J Lin… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
The wide spread of cloud computing and the rapid growth of online activities raise the
demand for privacy enhancing cryptography, such as identity-based encryption (IBE) …
demand for privacy enhancing cryptography, such as identity-based encryption (IBE) …