Cited By
View all- Paju AJaved MNurmi JSavimäki JMcGillion BBrumley B(2023)SoK: A Systematic Review of TEE Usage for Developing Trusted ApplicationsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600169(1-15)Online publication date: 29-Aug-2023
- Vasudevan AChaki S(2018)Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform2018 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP.2018.00021(183-198)Online publication date: Apr-2018
- Yalew SMaguire GCorreia MCheng XLiang Z(2016)Light-SPDProceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing10.1145/2940343.2940349(11-20)Online publication date: 5-Jul-2016
- Show More Cited By