Skip to content
VuFind
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • Čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
    • Galego
    • Tiếng Việt
    • Hrvatski
    • हिंदी
    • Հայերէն
    • Українська
    • Sámegiella
    • Монгол
Advanced
  • Confidential remote computing
  • Cite this
  • Text this
  • Email this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
Confidential remote computing

Confidential remote computing

<p>Since their market launch in late 2015, trusted hardware enclaves have revolutionised the computing world with data-in-use protections. Their security features of confidentiality, integrity and attestation attract many application developers to move their valuable assets, such as cryptograp...

Full description

Bibliographic Details
Main Author: Küçük, KA
Other Authors: Martin, A
Format: Thesis
Language:English
Published: 2022
Subjects:
Confidential communications
Cryptography
Digital rights management
ARM microprocessors
Computer programming
Attest function (Auditing)
Computers
Reduced instruction set computers
Smart power grids
Engineering
Software container technologies
Computer algorithms
Data encryption (Computer science)
Trust
Data integrity
Edge computing
Remote procedure calls
Hardware
C++ (Computer program language)
Cyberinfrastructure
Cloud computing
Internet of things
Malware (Computer software)
Computer security
Data privacy
Public key cryptography
CISC microprocessors
Hashing (Computer science)
Software
X86 assembly language (Computer program language)
Computer network architectures
  • Holdings
  • Description
  • Similar Items
  • Staff View

Similar Items

  • Hashing in computer science : fifty years of slicing and dicing /
    by: Konheim, Alan G., 1934-
    Published: (c201)
  • CipherTrace: automatic detection of ciphers from execution traces
    by: Hassanin, MA
    Published: (2020)
  • Java software structures : designing and using data structures /
    by: Lewis, John, 1963-, author, et al.
    Published: (c201)
  • Practical cryptography: algorithms and implementations using C++/
    by: Azad, Saiful, et al.
    Published: (2015)
  • Agile Java : crafting code with test-driven development /
    by: 248510 Langr, Jeff
    Published: (2005)

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs