Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Intrusion detection techniques in cloud environment: A survey
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …
Researchers have provided a survey on several intrusion detection techniques for detecting …
[PDF][PDF] Cryptographic algorithms: A review of the literature, weaknesses and open challenges
Abstract Information security has become an important issue in the modern world due to its
increasing popularity in Internet commerce and communication technologies such as the …
increasing popularity in Internet commerce and communication technologies such as the …
Keystone: An open framework for architecting trusted execution environments
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …
cloud servers and encompass a range of cost, power constraints, and security threat model …
[HTML][HTML] DVTChain: A blockchain-based decentralized mechanism to ensure the security of digital voting system voting system
Voting is a fundamental democratic activity. Many experts believe that paper balloting is the
only appropriate method to ensure everyone's right to vote. But this method is prone to errors …
only appropriate method to ensure everyone's right to vote. But this method is prone to errors …
Scalable memory protection in the {PENGLAI} enclave
Secure hardware enclaves have been widely used for protecting security-critical
applications in the cloud. However, existing enclave designs fail to meet the requirements of …
applications in the cloud. However, existing enclave designs fail to meet the requirements of …
A memory encryption engine suitable for general purpose processors
S Gueron - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Cryptographic protection of memory is an essential ingredient for any technology that allows
a closed computing system to run software in a trustworthy manner and handle secrets …
a closed computing system to run software in a trustworthy manner and handle secrets …
VAULT: Reducing paging overheads in SGX with efficient integrity verification structures
M Taassori, A Shafiee… - Proceedings of the Twenty …, 2018 - dl.acm.org
Intel's SGX offers state-of-the-art security features, including confidentiality, integrity, and
authentication (CIA) when accessing sensitive pages in memory. Sensitive pages are …
authentication (CIA) when accessing sensitive pages in memory. Sensitive pages are …
Ghostrider: A hardware-software system for memory trace oblivious computation
This paper presents a new, co-designed compiler and architecture called GhostRider for
supporting privacy preserving computation in the cloud. GhostRider ensures all programs …
supporting privacy preserving computation in the cloud. GhostRider ensures all programs …
Exploiting unprotected {I/O} operations in {AMD's} secure encrypted virtualization
AMD's Secure Encrypted Virtualization (SEV) is an emerging technology to secure virtual
machines (VM) even in the presence of malicious hypervisors. However, the lack of trust in …
machines (VM) even in the presence of malicious hypervisors. However, the lack of trust in …
Phantom: Practical oblivious computation in a secure processor
We introduce PHANTOM [1] a new secure processor that obfuscates its memory access
trace. To an adversary who can observe the processor's output pins, all memory access …
trace. To an adversary who can observe the processor's output pins, all memory access …