[HTML][HTML] Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things …
Z Wang, Y Zhou - Future Internet, 2025 - mdpi.com
With the extensive deployment and application of the Internet of Things (IoT), 5G and 6G
technologies and edge intelligence, the volume of data generated by IoT and the number of …
technologies and edge intelligence, the volume of data generated by IoT and the number of …
Controlled Copying of Persistent Data Between end Users' SGX Enclaves over an Untrusted Network
J Ishiguro, Y Shinjo, A Soyama - … International Symposium on …, 2024 - ieeexplore.ieee.org
It is difficult to protect digital rights while allowing data to be freely copied over the Internet.
This paper describes controlled copying of persistent data between two end users's PCs …
This paper describes controlled copying of persistent data between two end users's PCs …