搜索结果: 1-10 共查到“军事学 SGX”相关记录10条 . 查询时间(0.049 秒)
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Cloud Security Storage Protection Access Control, Policies
font style='font-size:12px;'>
2019/6/12
Secure cloud storage is considered as one of the most important issues that both businesses and end-users take into account before moving their private data to the cloud. Lately, we have seen some int...
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification
SGX TOFU
font style='font-size:12px;'>
2018/11/9
Intel's Software Guard Extensions (SGX) enables isolated execution environments, called enclaves, on untrusted operating systems (OS), and thus it can improve the security for various applications and...
Data Oblivious Genome Variants Search on Intel SGX
SGX TEE
font style='font-size:12px;'>
2018/8/10
We show how to build a practical, private data oblivious genome variants search using Intel SGX. More precisely, we consider the problem posed in Track 2 of the iDash Privacy and Security Workshop 201...
SGX Remote Attestation is not Sufficient
SGX SGX simulator
font style='font-size:12px;'>
2017/8/2
Intel SGX enclaves provide hardware enforced confidentiality and integrity guarantees for running pure computations (\ie, OS-level side-effect-free code) in the cloud environment. In addition, SGX rem...
CacheZoom: How SGX Amplifies The Power of Cache Attacks
Intel SGX Cache Attacks AES
font style='font-size:12px;'>
2017/6/28
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enf...
ZeroTrace : Oblivious Memory Primitives from Intel SGX
SGX secure hardware systems
font style='font-size:12px;'>
2017/6/9
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling secure cloud computing. On one hand, work in applied cryptography has enabled efficient, oblivious d...
Robust Synchronous P2P Primitives Using SGX Enclaves
Distributed systems SGX byzantine
font style='font-size:12px;'>
2017/2/28
Peer-to-peer (P2P) systems such as BitTorrent and Bitcoin are susceptible to serious attacks from byzantine nodes that join as peers. Due to well-known impossibility results for designing P2P primitiv...
Secure Multiparty Computation from SGX
Secure Hardware SGX Secure multiparty computation
font style='font-size:12px;'>
2016/12/7
Isolated Execution Environments (IEE) offered by novel commodity hardware such as Intel’s SGX deployed in Skylake processors permit executing software in a protected environment that shields it from a...
Intel SGX Explained
SGX hypervisor
font style='font-size:12px;'>
2016/2/23
Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel architecture that aims to provide integrity and privacy guarantees to security-sensitive computation performed on a computer...
Foundations of Hardware-Based Attested Computation and Application to SGX
isolated execution environments trusted hardware attestation
font style='font-size:12px;'>
2016/1/27
Exciting new capabilities of modern trusted hardware technologies allow for the execution
of arbitrary code within environments completely isolated from the rest of the
system and provide cryptograp...