Developing non-interactive MPC with trusted hardware for enhanced security.
Ryan KarlHannah BurchfieldJonathan TakeshitaTaeho JungPublished in: Int. J. Inf. Sec. (2022)
Keyphrases
- trusted computing
- network connection
- computing platform
- remote attestation
- low cost
- trusted platform module
- cloud computing
- random number generator
- computer security
- user interaction
- hardware and software
- real time
- virtual organization
- computing environments
- network security
- virtual reality
- intrusion detection
- security issues
- image processing
- security requirements
- access control
- security policies
- hardware implementation
- closed loop
- computer systems
- distributed environment
- vlsi implementation
- protection schemes
- user friendly
- network access
- information security
- immersive environments
- massively parallel
- hardware architecture
- application level
- key management
- computing systems