Leveraging Intel SGX Technology to Protect Security-Sensitive Applications.
Joseph SobchukSean R. O'MeliaDaniil M. UtinRoger KhazanPublished in: NCA (2018)
Keyphrases
- data encryption
- protection mechanisms
- protect sensitive
- intrusion detection
- information security
- rapid development
- key technologies
- cost effective
- security requirements
- sensitive data
- computer security
- digital rights management
- security problems
- information processing systems
- encryption algorithm
- data processing
- trusted computing
- security architecture
- radio frequency identification rfid
- data quality
- security analysis
- security issues
- network security