Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 443 matches
- 2024
- Hui Xie, Jun Zheng, Zhengyuan Zhang, Shengjun Wei, Changzhen Hu:
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things. Computing 106(3): 939-960 (2024) - N. Ilakkiya, A. Rajaram:
A novel DAG-blockchain structure for trusted routing in secure MANET-IoT environment. J. Intell. Fuzzy Syst. 46(3): 5733-5752 (2024) - Yanling Wang, Xiaolin Chang, Haoran Zhu, Jianhua Wang, Yanwei Gong, Lin Li:
Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC. IEEE Trans. Computers 73(4): 1138-1151 (2024) - Geunyeol Yu, Seunghyun Chae, Kyungmin Bae, Sungkun Moon:
Formal Specification of Trusted Execution Environment APIs. FASE 2024: 101-121 - Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer:
A Quantum Computer Trusted Execution Environment. HPCA 2024: 613 - Yuanchao Xu, James Pangia, Chencheng Ye, Yan Solihin, Xipeng Shen:
Data Enclave: A Data-Centric Trusted Execution Environment. HPCA 2024: 218-232 - Zhiang Li, Daisuke Mashima, Wen Shei Ong, Ertem Esiner, Zbigniew Kalbarczyk, Ee-Chien Chang:
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers. CoRR abs/2403.05448 (2024) - 2023
- Ivan Puddu:
Understanding the Capabilities of Privileged Attackers Against Trusted Execution Environments. ETH Zurich, Zürich, Switzerland, 2023 - Larissa Groth:
A Vulnerability Management Solution for constrained IoT devices with a Trusted Execution Environment using a Hardware Root of Trust. Free University of Berlin, Germany, 2023 - Mathias Morbitzer:
Analyzing and Improving the Security of Trusted Execution Environments. Technical University of Munich, Germany, 2023 - Mete Akgün, Elif Ustundag Soykan, Gürkan Soykan:
A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment. IEEE Access 11: 9182-9196 (2023) - Dongwoo Kang, Hyo Jin Jo:
TB-Logger: Secure Vehicle Data Logging Method Using Trusted Execution Environment and Blockchain. IEEE Access 11: 23282-23292 (2023) - Ziwang Wang, Liang Wang, Huili Yan:
MA-TEECM: Mutual Anonymous Authentication-Based Credential Migration Technology for Mobile Trusted Execution Environments. IEEE Access 11: 3680-3690 (2023) - Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer:
A Quantum Computer Trusted Execution Environment. IEEE Comput. Archit. Lett. 22(2): 177-180 (2023) - Anh-Tien Le, Trong-Thuc Hoang, Ba-Anh Dao, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
A cross-process Spectre attack via cache on RISC-V processor with trusted execution environment. Comput. Electr. Eng. 105: 108546 (2023) - Antonio Muñoz, Ruben Rios, Rodrigo Román, Javier López:
A survey on the (in)security of trusted execution environments. Comput. Secur. 129: 103180 (2023) - Thien-Phuc Doan, Ngoc-Tu Chau, Jungsoo Park, Souhwan Jung:
The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android. Comput. Syst. Sci. Eng. 46(3): 3059-3073 (2023) - Ashwin Verma, Pronaya Bhattacharya, Umesh Bodkhe, Deepti Saraswat, Sudeep Tanwar, Kapal Dev:
FedRec: Trusted rank-based recommender scheme for service provisioning in federated cloud environment. Digit. Commun. Networks 9(1): 33-46 (2023) - Pierluigi Plebani, Davide Rossetto, Francesco Tiezzi:
Empowering trusted data sharing for data analytics in a federated environment: A blockchain-based approach. Frontiers Blockchain 6 (2023) - Guoyun Duan, Yuanzhi Fu, Boyang Zhang, Peiyao Deng, Jianhua Sun, Hao Chen, Zhiwen Chen:
TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation. Future Gener. Comput. Syst. 144: 192-204 (2023) - Hui Xie, Jun Zheng, Teng He, Shengjun Wei, Changzhen Hu:
TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing system. Future Gener. Comput. Syst. 140: 321-330 (2023) - Marc Lacoste, Vincent Lefebvre:
Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats. IEEE Secur. Priv. 21(3): 37-46 (2023) - Valeria Lukaj, Francesco Martella, Maria Fazio, Antonio Celesti, Massimo Villari:
Establishment of a trusted environment for IoT service provisioning based on X3DH-Based brokering and Federated Blockchain. Internet Things 21: 100686 (2023) - Suhair Alshehri, Omaimah Bamasag, Daniyal M. Alghazzawi, Arwa Jamjoom:
Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment. IEEE Internet Things J. 10(5): 4239-4256 (2023) - Nan Yang, Li Yang, Xingzhou Du, Xunyi Guo, Fanke Meng, Yuwen Zhang:
Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario. J. Cloud Comput. 12(1): 122 (2023) - Antônio Augusto Fröhlich, Leonardo Passig Horstmann, José Luis Conradi Hoffmann:
A Secure IIoT Gateway Architecture based on Trusted Execution Environments. J. Netw. Syst. Manag. 31(2): 32 (2023) - Yang Zhang, Kaige Zhu, Xuan Zhao, Quancheng Zhao, Zhenjiang Zhang, Ali Kashif Bashir:
Research on resource allocation technology in highly trusted environment of edge computing. J. Parallel Distributed Comput. 178: 29-42 (2023) - Wei Zheng, Yang Cao, Haining Tan:
Secure sharing of industrial IoT data based on distributed trust management and trusted execution environments: a federated learning approach. Neural Comput. Appl. 35(29): 21499-21509 (2023) - Pratik Musale, Adam Lee:
Trust TEE?: Exploring the Impact of Trusted Execution Environments on Smart Home Privacy Norms. Proc. Priv. Enhancing Technol. 2023(3): 5-23 (2023) - Haotian Gao, Cong Yue, Tien Tuan Anh Dinh, Zhiyong Huang, Beng Chin Ooi:
Enabling Secure and Efficient Data Analytics Pipeline Evolution with Trusted Execution Environment. Proc. VLDB Endow. 16(10): 2485-2498 (2023)
skipping 413 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 02:57 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint