1. Intel software guard extensions: Epid provisioning and attestation services;johnson;White Paper 1 1–10 2016 and Security,2015
2. Attribution of Fraudulent Resource Consumption in the Cloud
3. Ksfoabe: outsourced attribute-based encryption with a keyboard search function for cloud storage;li;IEEETransactions,2017
4. Inferring fine-grained control flow inside SGX enclaves with branch shadowing;lee;26th USENIX Security Symposium ( USENIX Security 17),0