[PDF][PDF] Ginseng: Keeping Secrets in Registers When You Distrust the Operating System.
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System Page 1
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System Min Hong Yun …
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System Min Hong Yun …
Llakep: A low-latency authentication and key exchange protocol for energy internet of things in the metaverse era
X Zhang, X Huang, H Yin, J Huang, S Chai, B Xing… - Mathematics, 2022 - mdpi.com
The authenticated key exchange (AKE) protocol can ensure secure communication between
a client and a server in the electricity transaction of the Energy Internet of things (EIoT). Park …
a client and a server in the electricity transaction of the Energy Internet of things (EIoT). Park …
Alidrone: Enabling trustworthy proof-of-alibi for commercial drone compliance
Commercial use of Unmanned Aerial Vehicles (UAVs), or drones, promises to revolutionize
the way in which consumers interact with retail services. However, the further adoption of …
the way in which consumers interact with retail services. However, the further adoption of …
Microtee: designing tee os based on the microkernel architecture
ARM TrustZone technology is widely used to provide Trusted Execution Environments (TEE)
for mobile devices. However, most TEE OSes are implemented as monolithic kernels. In …
for mobile devices. However, most TEE OSes are implemented as monolithic kernels. In …
A privacy-preserving data collection and processing framework for third-party UAV services
Unmanned Aerial Vehicles (UAVs) are becoming more popular than ever in outdoor
commercial services. Many third-party UAV companies offer their UAVs as mobile data …
commercial services. Many third-party UAV companies offer their UAVs as mobile data …
One secure access scheme based on trusted execution environment
The wide adoption of mobile devices poses an imminent threat to preserving privacy. In
order to prevent the leakage of sensitive information (such as the contact list, or private …
order to prevent the leakage of sensitive information (such as the contact list, or private …
Trusted IP solution in multi-tenant cloud FPGA platform
Because FPGAs outperform traditional processing cores like CPUs and GPUs in terms of
performance per watt and flexibility, they are being used more and more in cloud and data …
performance per watt and flexibility, they are being used more and more in cloud and data …
The German eID as an authentication token on android devices
F Otterbein, T Ohlendorf, M Margraf - arXiv preprint arXiv:1701.04013, 2017 - arxiv.org
Due to the rapid increase of digitization within our society, digital identities gain more and
more importance. Provided by the German eID solution, every citizen has the ability to …
more importance. Provided by the German eID solution, every citizen has the ability to …
Rushmore: securely displaying static and animated images using TrustZone
We present Rushmore, a system that securely displays static or animated images using
TrustZone. The core functionality of Rushmore is to securely decrypt and display encrypted …
TrustZone. The core functionality of Rushmore is to securely decrypt and display encrypted …