共 29 条
[1]
Arnautov S, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P689
[2]
Shielding Applications from an Untrusted Cloud with Haven
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2015, 33 (03)
[3]
SecureKeeper: Confidential ZooKeeper using Intel SGX
[J].
MIDDLEWARE '16: PROCEEDINGS OF THE 17TH INTERNATIONAL MIDDLEWARE CONFERENCE,
2016,
[4]
Buyya R, 2017, ABS171109123 CORR
[6]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[7]
Homomorphic Evaluation of the AES Circuit
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2012,
2012, 7417
:850-867
[9]
Hunt T, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P533
[10]
TxBox: Building Secure, Efficient Sandboxes with System Transactions
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:329-344