Subject
Law,General Computer Science
Reference42 articles.
1. Aas J., Barnes R., Case B., Durumeric Z., Eckersley P., Flores-López A., Halderman J.A., Hoffman-Andrews J., Kasten J., Rescorla E., Schoen S., Warren B.. Let’s encrypt: an automated certificate authority to encrypt the entire web. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. London, United Kingdom; CCS ’19; 2019. p. 2473–2487.
2. Ahmed R., Zaheer Z., Li R., Ricci R.. Harpocrates: giving out your secrets and keeping them too. In: Proceedings of the IEEE/ACM Symposium on Edge Computing (SEC). Bellevue, WA, USA; 2018. p. 103–114.
3. Amazon. Aws cloudhsm: managed hardware security module (HSM) on the aws cloud. https://aws.amazon.com/cloudhsm/.
4. Innovative technology for CPU based attestation and sealing;Anati,2013
5. Talos: Secure and Transparent TLS Termination Inside SGX Enclaves;Aublin,2017
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献