[PDF][PDF] Ginseng: Keeping Secrets in Registers When You Distrust the Operating System.

MH Yun, L Zhong - NDSS, 2019 - ndss-symposium.org
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System Page 1
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System Min Hong Yun …

Llakep: A low-latency authentication and key exchange protocol for energy internet of things in the metaverse era

X Zhang, X Huang, H Yin, J Huang, S Chai, B Xing… - Mathematics, 2022 - mdpi.com
The authenticated key exchange (AKE) protocol can ensure secure communication between
a client and a server in the electricity transaction of the Energy Internet of things (EIoT). Park …

Alidrone: Enabling trustworthy proof-of-alibi for commercial drone compliance

T Liu, A Hojjati, A Bates… - 2018 IEEE 38th …, 2018 - ieeexplore.ieee.org
Commercial use of Unmanned Aerial Vehicles (UAVs), or drones, promises to revolutionize
the way in which consumers interact with retail services. However, the further adoption of …

[PDF][PDF] 冯登国院士

冯登国 - 2020 - scis.scichina.com
摘要可信计算以硬件安全机制为基础, 建立可信赖计算环境, 从体系结构上全面增强系统和网络
信任, 是当前学术界和产业界的关注热点. 随着信息技术的深入发展, 新应用场景的不断涌现 …

Microtee: designing tee os based on the microkernel architecture

D Ji, Q Zhang, S Zhao, Z Shi… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
ARM TrustZone technology is widely used to provide Trusted Execution Environments (TEE)
for mobile devices. However, most TEE OSes are implemented as monolithic kernels. In …

A privacy-preserving data collection and processing framework for third-party UAV services

T Liu, H Guo, C Danilov… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) are becoming more popular than ever in outdoor
commercial services. Many third-party UAV companies offer their UAVs as mobile data …

One secure access scheme based on trusted execution environment

Y Fan, S Liu, G Tan, X Lin, G Zhao… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
The wide adoption of mobile devices poses an imminent threat to preserving privacy. In
order to prevent the leakage of sensitive information (such as the contact list, or private …

Trusted IP solution in multi-tenant cloud FPGA platform

MK Ahmed, SK Saha, C Bobda - … 8th World Forum on Internet of …, 2022 - ieeexplore.ieee.org
Because FPGAs outperform traditional processing cores like CPUs and GPUs in terms of
performance per watt and flexibility, they are being used more and more in cloud and data …

The German eID as an authentication token on android devices

F Otterbein, T Ohlendorf, M Margraf - arXiv preprint arXiv:1701.04013, 2017 - arxiv.org
Due to the rapid increase of digitization within our society, digital identities gain more and
more importance. Provided by the German eID solution, every citizen has the ability to …

Rushmore: securely displaying static and animated images using TrustZone

CM Park, D Kim, DV Sidhwani, A Fuchs… - Proceedings of the 19th …, 2021 - dl.acm.org
We present Rushmore, a system that securely displays static or animated images using
TrustZone. The core functionality of Rushmore is to securely decrypt and display encrypted …