Design and implementation of trusted boot based on a new trusted computing dual-architecture

C Zheng, J Li, X Yao - Computers & Security, 2023 - Elsevier
Abstract Trusted Platform Module (TPM) is considered to be one of the best technologies to
ensure computer system security at present, but it has some defects. The TPM chip exposed …

Secure similarity queries over vertically distributed data via TEE-enhanced cloud computing

Y Zheng, H Zhu, R Lu, S Zhang, Y Guan… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Outsourcing big data to cloud servers has gained prominence, and growing concerns about
privacy, alongside privacy-related regulations, underscore the need to encrypt data before …

Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC

Y Wang, X Chang, H Zhu, J Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Processing sensitive data and deploying well-designed Intellectual Property (IP) cores on
remote Field Programmable Gate Array (FPGA) are prone to private data leakage and IP …

Blockchain based secret key management for trusted platform module standard in reconfigurable platform

R Paul, N Ghosh, A Panigrahi… - Concurrency and …, 2024 - Wiley Online Library
The growing sophistication of cyber attacks, vulnerabilities in high computing systems and
increasing dependency on cryptography to protect our digital data, make it more important to …

Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data

Y Zheng, H Zhu, R Lu, Y Guan, S Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The aggregated reverse kNN (ARkNN) query aims to identify one query record with the
maximum influence set and has become a powerful tool to support optimal decision-making …

[HTML][HTML] A fine-grained secure service provisioning platform for hypervisor systems

J Seo, S Lee, KI Kim, KH Kim - Electronics, 2022 - mdpi.com
As computing technology has been recently widely adopted, most computing devices
provide security-related services as basic requirements, which is an important research …

Towards Runtime Customizable Trusted Execution Environment on FPGA-SoC

Y Wang, X Chang, H Zhu, J Wang, Y Gong… - arxiv preprint arxiv …, 2023 - arxiv.org
Processing sensitive data and deploying well-designed Intellectual Property (IP) cores on
remote Field Programmable Gate Array (FPGA) are prone to private data leakage and IP …

A Comprehensive Survey of TPM for Defense Systems

C Ryu, JH Lee, DH Kim, HS Lee, YS Kim… - KSII Transactions on …, 2024 - koreascience.kr
Lately, there has been a notable surge in the defense industry's efforts to develop highly
advanced intelligent systems. These systems encompass sophisticated computing platforms …

Towards trustworthy TrustZone-assisted TEEs

DM Cerdeira - 2024 - repositorium.sdum.uminho.pt
As personal computers and mobile devices have become mainstream, ensuring the security
of sensitive data has become crucial. However, as systems grow more complex …

Post-Quantum Firmware Integrity Verification for **linx Zynq UltraScale+ MPSoC

GD Biondo - 2024 - webthesis.biblio.polito.it
In today's fast-paced technological environment, cybersecurity is facing critical challenges,
especially with the rise of quantum computing. This advancement threatens traditional …