Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Intel software guard extensions applications: A survey
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
[HTML][HTML] SGXAP: SGX-based authentication protocol in IoV-enabled fog computing
With the maturity and popularization of the Internet of Things, we saw the emergence of the
Internet of Vehicles. This collects and processes real-time traffic information, alleviates traffic …
Internet of Vehicles. This collects and processes real-time traffic information, alleviates traffic …
[HTML][HTML] SAKAP: SGX-based authentication key agreement protocol in IoT-enabled cloud computing
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used
in people's daily lives. As the number of IoT devices increases, the amount of data to be …
in people's daily lives. As the number of IoT devices increases, the amount of data to be …
A secure authentication scheme for wireless sensor networks based on DAC and Intel SGX
X Liu, Z Guo, J Ma, Y Song - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are widely implemented in military, intelligent medical,
intelligent transportation, space exploration, and other fields. However, the authentication …
intelligent transportation, space exploration, and other fields. However, the authentication …
UP-SSO: enhancing the user privacy of SSO by integrating PPID and SGX
Single sign-on (SSO) services are widely deployed on the Internet as the identity
management and authentication infrastructure. In an SSO system, after authenticated by the …
management and authentication infrastructure. In an SSO system, after authenticated by the …
Using a shared SGX enclave in the UNIX PAM authentication service
Confidentiality in the storage and handling of sensitive data is a central concern in
computing security; one of the most sensitive data in computer systems is users' credentials …
computing security; one of the most sensitive data in computer systems is users' credentials …
Trusted and only trusted. that is the access! improving access control allowing only trusted execution environment applications
Security concerns should always be considered when deploying distributed systems that
deal with sensitive data. Generally, the software components responsible for storing these …
deal with sensitive data. Generally, the software components responsible for storing these …
[PDF][PDF] Enclave Management Models for Safe Execution of Software Components.
Data confidentiality is becoming increasingly important to computer users, both in corporate
and personal environments. In this sense, there are several solutions proposed to maintain …
and personal environments. In this sense, there are several solutions proposed to maintain …
Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs.
Due to the nature of the public channel, designing authentication techniques suitable for
wireless sensor networks (WSNs) that satisfy the dedicated considerations is critical. In …
wireless sensor networks (WSNs) that satisfy the dedicated considerations is critical. In …
Enhancing security and usability in password-based web systems through standardized authentication interactions
A Gautam - 2024 - trace.tennessee.edu
Password-based authentication is the predominant method for securing access on the web,
yet it is fraught with challenges due to the web's lack of inherent design for authentication …
yet it is fraught with challenges due to the web's lack of inherent design for authentication …