Cerca
Items 1-1 di 1
Theoretical and Practical Aspects of Trusted Execution Environments in Information Security and Volunteer Computing
(2018-08-06)
Commodity operating systems, both on desktop and mobile devices, offer
rich functionality and consequently a significant attack surface. A compromise
of the operating system, however, means that an attacker also has
access ...