Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

GAIN: Decentralized privacy-preserving federated learning

C Jiang, C Xu, C Cao, K Chen - Journal of Information Security and …, 2023 - Elsevier
Federated learning enables multiple participants to cooperatively train a model, where each
participant computes gradients on its data and a coordinator aggregates gradients from …

Efficient Distributed Secure Memory with Migratable Merkle Tree

E Feng, D Du, Y **a, H Chen - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Hardware-assisted enclaves with memory encryption have been widely adopted in the
prevailing architectures, eg, Intel SGX/TDX, AMD SEV, ARM CCA, etc. However, existing …

Achieving efficient and privacy-preserving location-based task recommendation in spatial crowdsourcing

F Song, J Liang, C Zhang, Z Fu, Z Qin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In spatial crowdsourcing, location-based task recommendation schemes are widely used to
match appropriate workers in desired geographic areas with relevant tasks from data …

Trust-DETM: Distributed Energy Trading Model Based on Trusted Execution Environment

X Lu, H Guo - Mathematics, 2023 - mdpi.com
The traditional centralized power trading model suffers from high maintenance costs, low
processing efficiency and unsynchronized information, and it cannot adapt to the high …

6G: Technology Evolution in Future Wireless Networks

M Shafi, RK Jha, S Jain - IEEE Access, 2024 - ieeexplore.ieee.org
The Sixth Generation (6G) Wireless Communication Network (WCN) is the successive
provision to ameliorate the gain with ultra-low latency, and e xtremely high energy efficiency …

Privacy-preserving and verifiable data aggregation for Internet of Vehicles

F Zhou, Q Wu, P Wu, J Xu, D Feng - Computer Communications, 2024 - Elsevier
With the development of Internet of Vehicles (IoV), organizations or institutions are
increasingly interested in aggregating vehicle perception data to perform data analysis …

Asynchronous Remote Distributed Key Generation Method for Securing User Data in the Metaverse

Y Wang, G Fang, S Huang, Z Lian… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The rapid development of consumer electronics technology has greatly promoted the
progress of the metaverse. However, as a digitized virtual environment, the metaverse …

2D-SAZD: A Novel 2D Coded Distributed Computing Framework for Matrix-Matrix Multiplication

M Dai, Z Zhang, Z Zheng, Z Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
By separating huge dimensional matrix-matrix multiplication at a single computing node into
parallel small matrix multiplications (with appropriate encoding) at parallel worker nodes …

Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity

P Wu, J Ning, X Huang, JK Liu - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Privacy-preserving pattern matching enables a user to find all occurrences of a pattern in a
text without revealing any sensitive information. However, many previous works designed on …