Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
When blockchain meets SGX: An overview, challenges, and open issues
As a decentralized, public, and digital ledger technology in Peer-to-Peer network,
blockchain has received much attention from various fields, including finance, healthcare …
blockchain has received much attention from various fields, including finance, healthcare …
{AEX-Notify}: Thwarting Precise {Single-Step**} Attacks through Interrupt Awareness for Intel {SGX} Enclaves
Intel® Software Guard Extensions (Intel® SGX) supports the creation of shielded enclaves
within unprivileged processes. While enclaves are architecturally protected against …
within unprivileged processes. While enclaves are architecturally protected against …
Occlumency: Privacy-preserving remote deep-learning inference using SGX
Deep-learning (DL) is receiving huge attention as enabling techniques for emerging mobile
and IoT applications. It is a common practice to conduct DNN model-based inference using …
and IoT applications. It is a common practice to conduct DNN model-based inference using …
Benchmarking the second generation of intel sgx hardware
In recent years, trusted execution environments (TEEs) such as Intel Software Guard
Extensions (SGX) have gained a lot of attention in the database community. This is because …
Extensions (SGX) have gained a lot of attention in the database community. This is because …
Engraft: Enclave-guarded raft on byzantine faulty nodes
This paper presents the first critical analysis of building highly secure, performant, and
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …
Confidentiality support over financial grade consortium blockchain
Y Yan, C Wei, X Guo, X Lu, X Zheng, Q Liu… - Proceedings of the …, 2020 - dl.acm.org
Confidentiality is an indispensable requirement in financial applications of blockchain
technology, and supporting it along with high performance and friendly programmability is …
technology, and supporting it along with high performance and friendly programmability is …
Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted
data centers; hence, the confidentiality and integrity of the code and data are of paramount …
data centers; hence, the confidentiality and integrity of the code and data are of paramount …
Citadel: Protecting data privacy and model confidentiality for collaborative learning
Many organizations own data but have limited machine learning expertise (data owners). On
the other hand, organizations that have expertise need data from diverse sources to train …
the other hand, organizations that have expertise need data from diverse sources to train …
Goten: Gpu-outsourcing trusted execution of neural network training
Deep learning unlocks applications with societal impacts, eg, detecting child exploitation
imagery and genomic analysis of rare diseases. Deployment, however, needs compliance …
imagery and genomic analysis of rare diseases. Deployment, however, needs compliance …
SvTPM: SGX-based virtual trusted platform modules for cloud computing
J Wang, J Wang, C Fan, F Yan, Y Cheng… - … on Cloud Computing, 2023 - ieeexplore.ieee.org
Virtual Trusted Platform Modules (vTPMs) are widely used in commercial cloud platforms
(eg, VMware Cloud, Google Cloud, and Microsoft Azure) to provide virtual root-of-trust and …
(eg, VMware Cloud, Google Cloud, and Microsoft Azure) to provide virtual root-of-trust and …