搜索结果: 1-2 共查到“军事学 secure processors”相关记录2条 . 查询时间(0.083 秒)
Formal Abstractions for Attested Execution Secure Processors
trusted hardware attested execution protocol
2016/12/7
Realistic secure processors, including those built for academic and commercial purposes,
commonly realize an “attested execution” abstraction. Despite being the de facto standard
for modern secure p...
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
Path Oblivious RAM secure processor integrity verification
2013/4/18
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy in these settings is to use tamper-resistant processors. Users' pr...