Cited By
View all- Peng WLi XNiu JZhang XZhang Y(2024)Ensuring State Continuity for Confidential Computing: A Blockchain-Based ApproachIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.338197321:6(5635-5649)Online publication date: Nov-2024
- Briongos SKarame GSoriente CWilde A(2023)No Forking Way: Detecting Cloning Attacks on Intel SGX ApplicationsProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627187(744-758)Online publication date: 4-Dec-2023
- Niu JPeng WZhang XZhang YYin HStavrou ACremers CShi E(2022)NARRATORProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560620(2385-2399)Online publication date: 7-Nov-2022
- Show More Cited By