Uranus: Simple, efficient sgx programming and its applications
Applications written in Java have strengths to tackle diverse threats in public clouds, but
these applications are still prone to privileged attacks when processing plaintext data. Intel …
these applications are still prone to privileged attacks when processing plaintext data. Intel …
Daenet: Making strong anonymity scale in a fully decentralized network
Traditional anonymous networks (eg, Tor) are vulnerable to traffic analysis attacks that
monitor the whole network traffic to determine which users are communicating. To preserve …
monitor the whole network traffic to determine which users are communicating. To preserve …
LSPP: a leakage-resilient security approach for a cloud-assisted big data
Data collection has exponentially increased due to the need for new insights in data-centric
perspective. This leads to an increased need for scalable and efficient storage and …
perspective. This leads to an increased need for scalable and efficient storage and …