A formal treatment of the role of verified compilers in secure computation | 0 | 0.34 | 2022 |
Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale? | 0 | 0.34 | 2022 |
Boolean Searchable Symmetric Encryption With Filters on Trusted Hardware | 0 | 0.34 | 2022 |
CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes | 0 | 0.34 | 2021 |
TrustFS: An SGX-Enabled Stackable File System Framework | 0 | 0.34 | 2019 |
A Machine-Checked Proof of Security for AWS Key Management Service | 3 | 0.40 | 2019 |
Secure Multiparty Computation from SGX. | 11 | 0.58 | 2017 |
A Practical Framework for Privacy-Preserving NoSQL Databases | 1 | 0.41 | 2017 |
Foundations of Hardware-Based Attested Computation and Application to SGX | 23 | 0.82 | 2016 |