Cited By
View all- Peng WLi XNiu JZhang XZhang Y(2024)Ensuring State Continuity for Confidential Computing: A Blockchain-Based ApproachIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.338197321:6(5635-5649)Online publication date: 1-Nov-2024
- Niu JPeng WZhang XZhang YYin HStavrou ACremers CShi E(2022)NARRATORProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560620(2385-2399)Online publication date: 7-Nov-2022
- Bozkurt E(2022)The usage of cybernetic in complex software systems and its application to the deterministic multithreadingConcurrency and Computation: Practice and Experience10.1002/cpe.737534:28Online publication date: 31-Oct-2022
- Show More Cited By