A Survey of Published Attacks on Intel SGX A Nilsson, PN Bideh, J Brorsson https://arxiv.org/abs/2006.13598, 2020 | 183 | 2020 |
Evaluating the performance of the OSCORE security protocol in constrained IoT environments M Gunnarsson, J Brorsson, F Palombini, L Seitz, M Tiloca Internet of Things 13, 100333, 2021 | 26 | 2021 |
PAPR: Publicly auditable privacy revocation for anonymous credentials J Brorsson, B David, L Gentile, E Pagnin, PS Wagner Cryptographers’ Track at the RSA Conference, 163-190, 2023 | 16 | 2023 |
Guarding the guards: Accountable authorities in vanets J Brorsson, PS Wagner, M Hell 2018 IEEE Vehicular Networking Conference (VNC), 1-4, 2018 | 6 | 2018 |
A survey of published attacks on Intel SGX. arXiv 2020 A Nilsson, PN Bideh, J Brorsson arXiv preprint arXiv:2006.13598, 2006 | 5 | 2006 |
Dipsauce: efficient private stream aggregation without trusted parties J Brorsson, M Gunnarsson Nordic Conference on Secure IT Systems, 204-222, 2023 | 4 | 2023 |
On the suitability of using SGX for secure key storage in the cloud J Brorsson, PN Bideh, A Nilsson, M Hell International Conference on Trust and Privacy in Digital Business, 32-47, 2020 | 2 | 2020 |
Compact object security for the internet of things J Brorsson, M Gunnarsson | 2 | 2016 |
On the Trustworthiness of Trusted Third Parties J Brorsson Series of licentiate and doctoral theses, 2025 | | 2025 |
Consistency-or-Die: Consistency for Key Transparency J Brorsson, E Pagnin, B David, PS Wagner Cryptology ePrint Archive, 2024 | | 2024 |