DC-PoET: proof-of-elapsed-time consensus with distributed coordination for blockchain networks

A Pal, K Kant - 2021 IFIP Networking Conference (IFIP …, 2021 - ieeexplore.ieee.org
Blockchain technology has gained a significant amount of interest in recent years due to its
decentralized control, immutability, transparency and robustness. In this paper we propose …

Unleashing the potential of data ecosystems: establishing digital trust through trust-enhancing technologies

F Schäfer, J Rosen, C Zimmermann, F Wortmann - 2023 - aisel.aisnet.org
Companies increasingly innovate data-driven business models, enabling them to create
new products and services. Emerging data ecosystems provide these companies access to …

Blue Book: A set of cybersecurity roadmaps and challenges for researchers and policymakers

E Markatos, K Rannenberg, E Athanasopoulos… - 2022 - orbit.dtu.dk
After the completion of its third year of operation in 2022, the CyberSec4Europe1 pilot
project (https://cybersec4europe. eu/) produced this” Blue Book”(and delivered it as …

Security broker with consumer proxying for tee-protected services

MHM Bursell, L Sturmann - US Patent 11,856,002, 2023 - Google Patents
The technology disclosed herein enable a consumer to verify the integrity of services
running in trusted execution environments. An example method may include: receiving, by a …

Trusted service for detecting attacks on trusted execution environments

G Karame, C Soriente - US Patent 11,748,472, 2023 - Google Patents
A method for providing a trusted service to a trusted execution environment running on a
remote host machine includes receiving a message from the trusted execution environment …

HW-SW architectures for security and data protection at the edge

D Gazidedja - 2020 - politesi.polimi.it
With the rapid development of technology, nowadays, ensuring security translates into
several design challenges, imposed by the unique features of these systems. These features …