Uranus: Simple, efficient sgx programming and its applications

J Jiang, X Chen, TO Li, C Wang, T Shen… - Proceedings of the 15th …, 2020 - dl.acm.org
Applications written in Java have strengths to tackle diverse threats in public clouds, but
these applications are still prone to privileged attacks when processing plaintext data. Intel …

Daenet: Making strong anonymity scale in a fully decentralized network

T Shen, J Jiang, Y Jiang, X Chen, J Qi… - … on Dependable and …, 2021 - ieeexplore.ieee.org
Traditional anonymous networks (eg, Tor) are vulnerable to traffic analysis attacks that
monitor the whole network traffic to determine which users are communicating. To preserve …

LSPP: a leakage-resilient security approach for a cloud-assisted big data

I Bouleghlimat, S Boudouda, S Hacini - The Journal of Supercomputing, 2025 - Springer
Data collection has exponentially increased due to the need for new insights in data-centric
perspective. This leads to an increased need for scalable and efficient storage and …