
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 128 matches
- 2021
- Jiashuo Zhang, Jianbo Gao, Ke Wang, Zhenhao Wu, Ying Lan, Zhi Guan, Zhong Chen:
TBFT: Understandable and Efficient Byzantine Fault Tolerance using Trusted Execution Environment. CoRR abs/2102.01970 (2021) - Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, Sheng Zhong:
App Developer Centric Trusted Execution Environment. CoRR abs/2102.02465 (2021) - 2020
- Trong-Thuc Hoang
, Ckristian Duran, Duc-Thinh Nguyen-Hoang, Duc-Hung Le, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
Quick Boot of Trusted Execution Environment With Hardware Accelerators. IEEE Access 8: 74015-74023 (2020) - Unsung Lee
, Chanik Park:
SofTEE: Software-Based Trusted Execution Environment for User Applications. IEEE Access 8: 121874-121888 (2020) - Haiyong Sun
, Hang Lei
:
A Design and Verification Methodology for a TrustZone Trusted Execution Environment. IEEE Access 8: 33870-33883 (2020) - Yong Wang
, June Li
, Siyu Zhao
, Fajiang Yu
:
Hybridchain: A Novel Architecture for Confidentiality-Preserving and Performant Permissioned Blockchain Using Trusted Execution Environment. IEEE Access 8: 190652-190662 (2020) - Yongkai Fan, Shengle Liu, Gang Tan, Fei Qiao:
Fine-grained access control based on Trusted Execution Environment. Future Gener. Comput. Syst. 109: 551-561 (2020) - Patrick Jauernig
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
Trusted Execution Environments: Properties, Applications, and Challenges. IEEE Secur. Priv. 18(2): 56-60 (2020) - David Kohlbrenner, Shweta Shinde
, Dayeol Lee, Krste Asanovic, Dawn Song:
Building Open Trusted Execution Environments. IEEE Secur. Priv. 18(5): 47-56 (2020) - Michael Schwarz, Daniel Gruss
:
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks. IEEE Secur. Priv. 18(5): 18-27 (2020) - Ziwang Wang, Yi Zhuang:
Malicious Code Detection for Trusted Execution Environment Based on Paillier Homomorphic Encryption. IEICE Trans. Commun. 103-B(3): 155-166 (2020) - Yu Chen, Fang Luo, Tong Li
, Tao Xiang
, Zheli Liu, Jin Li
:
A training-integrity privacy-preserving federated learning scheme with trusted execution environment. Inf. Sci. 522: 69-79 (2020) - Yihuai Liang
, Yan Li
, Byeong-Seok Shin
:
FairCs - Blockchain-Based Fair Crowdsensing Scheme using Trusted Execution Environment. Sensors 20(11): 3172 (2020) - Yin Liu, Kijin An, Eli Tilevich
:
RT-Trust: Automated refactoring for different trusted execution environments under real-time constraints. J. Comput. Lang. 56: 100939 (2020) - Kuniyasu Suzaki, Akira Tsukamoto, Andy Green, Mohammad Mannan:
Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices. ACSAC 2020: 428-441 - Akshay Gangal, Mengmei Ye, Sheng Wei:
HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment. AsianHOST 2020: 1-6 - Jinjin Shao, Shiyu Ji, Alvin Oliver Glova, Yifan Qiao, Tao Yang, Tim Sherwood:
Index Obfuscation for Oblivious Document Retrieval in a Trusted Execution Environment. CIKM 2020: 1345-1354 - Marciano da Rocha, Dalton Cézane Gomes Valadares, Angelo Perkusich
, Kyller Costa Gorgônio, Rodrigo Tomaz Pagno, Newton Carlos Will:
Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment. CLOSER 2020: 31-43 - Shengtuo Hu, Qi Alfred Chen, Jiwon Joung, Can Carlak, Yiheng Feng, Z. Morley Mao, Henry X. Liu:
CVShield: Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment. AutoSec@CODASPY 2020: 1-4 - Lakshmi Padmaja Maddali, Meena Singh Dilip Thakur, R. Vigneswaran, M. A. Rajan, Srujana Kanchanapalli, Batsayan Das:
VeriBlock: A Novel Blockchain Framework based on Verifiable Computing and Trusted Execution Environment. COMSNETS 2020: 1-6 - Dayeol Lee, David Kohlbrenner, Shweta Shinde, Krste Asanovic, Dawn Song:
Keystone: an open framework for architecting trusted execution environments. EuroSys 2020: 38:1-38:16 - Peng Li, Xiaofei Luo, Toshiaki Miyazaki, Song Guo:
Privacy-preserving Payment Channel Networks using Trusted Execution Environment. ICC 2020: 1-6 - Yuepeng Li, Deze Zeng, Lin Gu, Andong Zhu, Quan Chen:
Task Offloading in Trusted Execution Environment empowered Edge Computing. ICPADS 2020: 316-323 - Trong-Thuc Hoang, Ckristian Duran, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
Cryptographic Accelerators for Trusted Execution Environment in RISC-V Processors. ISCAS 2020: 1-4 - Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi:
DarkneTZ: towards model privacy at the edge using trusted execution environments. MobiSys 2020: 161-174 - Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng:
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. IEEE Symposium on Security and Privacy 2020: 1450-1465 - Aref Asvadishirehjini, Murat Kantarcioglu, Bradley A. Malin:
A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments. TPS-ISA 2020: 138-147 - Jingbin Liu, Yu Qin, Dengguo Feng:
SeRoT: A Secure Runtime System on Trusted Execution Environments. TrustCom 2020: 30-37 - Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi:
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. USENIX Security Symposium 2020: 451-468 - Marcel Busch, Johannes Westphal, Tilo Müller:
Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment. WOOT @ USENIX Security Symposium 2020
skipping 98 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-03-04 05:18 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint