军事学 >>> 军事学
搜索结果: 1-10 共查到军事学 SGX相关记录10条 . 查询时间(0.062 秒)
Secure cloud storage is considered as one of the most important issues that both businesses and end-users take into account before moving their private data to the cloud. Lately, we have seen some int...
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification     SGX  TOFU       font style='font-size:12px;'> 2018/11/9
Intel's Software Guard Extensions (SGX) enables isolated execution environments, called enclaves, on untrusted operating systems (OS), and thus it can improve the security for various applications and...
Data Oblivious Genome Variants Search on Intel SGX     SGX  TEE       font style='font-size:12px;'> 2018/8/10
We show how to build a practical, private data oblivious genome variants search using Intel SGX. More precisely, we consider the problem posed in Track 2 of the iDash Privacy and Security Workshop 201...
SGX Remote Attestation is not Sufficient     SGX  SGX simulator       font style='font-size:12px;'> 2017/8/2
Intel SGX enclaves provide hardware enforced confidentiality and integrity guarantees for running pure computations (\ie, OS-level side-effect-free code) in the cloud environment. In addition, SGX rem...
CacheZoom: How SGX Amplifies The Power of Cache Attacks     Intel SGX  Cache Attacks  AES       font style='font-size:12px;'> 2017/6/28
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enf...
ZeroTrace : Oblivious Memory Primitives from Intel SGX     SGX  secure hardware systems       font style='font-size:12px;'> 2017/6/9
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling secure cloud computing. On one hand, work in applied cryptography has enabled efficient, oblivious d...
Robust Synchronous P2P Primitives Using SGX Enclaves     Distributed systems  SGX  byzantine       font style='font-size:12px;'> 2017/2/28
Peer-to-peer (P2P) systems such as BitTorrent and Bitcoin are susceptible to serious attacks from byzantine nodes that join as peers. Due to well-known impossibility results for designing P2P primitiv...
Secure Multiparty Computation from SGX     Secure Hardware  SGX  Secure multiparty computation       font style='font-size:12px;'> 2016/12/7
Isolated Execution Environments (IEE) offered by novel commodity hardware such as Intel’s SGX deployed in Skylake processors permit executing software in a protected environment that shields it from a...
Intel SGX Explained     SGX  hypervisor       font style='font-size:12px;'> 2016/2/23
Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel architecture that aims to provide integrity and privacy guarantees to security-sensitive computation performed on a computer...
Exciting new capabilities of modern trusted hardware technologies allow for the execution of arbitrary code within environments completely isolated from the rest of the system and provide cryptograp...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...