Author:
Arfaoui Ghada,Gharout Saïd,Lalande Jean-François,Traoré Jacques
Publisher
Springer International Publishing
Reference21 articles.
1. Lecture Notes in Computer Science;J-S Coron,2012
2. Areno, M., Plusquellic, J.: Securing trusted execution environments with PUF generated secret keys. In: 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, UK, pp. 1188–1193. IEEE Computer Society, June 2012
3. Arfaoui, G., Gharout, S., Traoré, J.: Trusted execution environments: a look under the hood. In: 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Oxford, UK, pp. 259–266. IEEE Computer Society, April 2014
4. Lecture Notes in Computer Science;A Armando,2005
5. Asokan, N., Ekberg, J.E., Kostiainen, K.: The untapped potential of trusted execution environments on mobile devices. IEEE Security And Privacy 12(4), 293–294 (2013)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献