Cited By
View all- Misono MStavrakakis DSantos NBhatotia P(2024)Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDXProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/37004188:3(1-42)Online publication date: 10-Dec-2024
- Shobiri BPourali SMigault DBoureanu IPreda SMannan MYoussef A(2024)LURK-T: Limited Use of Remote Keys With Added Trust in TLS 1.3IEEE Transactions on Network Science and Engineering10.1109/TNSE.2024.343283611:6(6313-6327)Online publication date: Nov-2024
- Ménétrey JPasin MFelber PSchiavoni VMazzeo GHollum AVaydia D(2024)A Comprehensive Trusted Runtime for WebAssembly With Intel SGXIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.333451621:4(3562-3579)Online publication date: 1-Jul-2024
- Show More Cited By