Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023‏ - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

[HTML][HTML] SGXAP: SGX-based authentication protocol in IoV-enabled fog computing

TY Wu, X Guo, YC Chen, S Kumari, CM Chen - Symmetry, 2022‏ - mdpi.com
With the maturity and popularization of the Internet of Things, we saw the emergence of the
Internet of Vehicles. This collects and processes real-time traffic information, alleviates traffic …

[HTML][HTML] SAKAP: SGX-based authentication key agreement protocol in IoT-enabled cloud computing

TY Wu, L Wang, X Guo, YC Chen, SC Chu - Sustainability, 2022‏ - mdpi.com
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used
in people's daily lives. As the number of IoT devices increases, the amount of data to be …

A secure authentication scheme for wireless sensor networks based on DAC and Intel SGX

X Liu, Z Guo, J Ma, Y Song - IEEE Internet of Things Journal, 2021‏ - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are widely implemented in military, intelligent medical,
intelligent transportation, space exploration, and other fields. However, the authentication …

UP-SSO: enhancing the user privacy of SSO by integrating PPID and SGX

C Guo, F Lang, Q Wang, J Lin - 2021 International Conference …, 2022‏ - ieeexplore.ieee.org
Single sign-on (SSO) services are widely deployed on the Internet as the identity
management and authentication infrastructure. In an SSO system, after authenticated by the …

Using a shared SGX enclave in the UNIX PAM authentication service

NC Will, CA Maziero - 2020 IEEE International Systems …, 2020‏ - ieeexplore.ieee.org
Confidentiality in the storage and handling of sensitive data is a central concern in
computing security; one of the most sensitive data in computer systems is users' credentials …

Trusted and only trusted. that is the access! improving access control allowing only trusted execution environment applications

DCG Valadares, A Sobrinho, NC Will… - International Conference …, 2023‏ - Springer
Security concerns should always be considered when deploying distributed systems that
deal with sensitive data. Generally, the software components responsible for storing these …

[PDF][PDF] Enclave Management Models for Safe Execution of Software Components.

NC Will, CA Maziero - ICISSP, 2024‏ - scitepress.org
Data confidentiality is becoming increasingly important to computer users, both in corporate
and personal environments. In this sense, there are several solutions proposed to maintain …

Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs.

MI Ahmed Al-Baghdadi, MR Asaar - ISeCure, 2024‏ - search.ebscohost.com
Due to the nature of the public channel, designing authentication techniques suitable for
wireless sensor networks (WSNs) that satisfy the dedicated considerations is critical. In …

Enhancing security and usability in password-based web systems through standardized authentication interactions

A Gautam - 2024‏ - trace.tennessee.edu
Password-based authentication is the predominant method for securing access on the web,
yet it is fraught with challenges due to the web's lack of inherent design for authentication …