搜索结果: 1-5 共查到“军事学 Trusted Execution”相关记录5条 . 查询时间(0.06 秒)
Decentralized blockchains offer attractive advantages over traditional payments such as the ability to operate without a trusted authority and increased user privacy. However, the verification of bloc...
ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution
Lightweight Clients Trusted Execution
2018/11/2
Cryptocurrencies record transactions between parties in a blockchain maintained by a peer-to-peer network. In most cryptocurrencies, transactions explicitly identify the previous transaction providing...
DelegaTEE: Brokered Delegation Using Trusted Execution Environments
Credential delegation access control trusted execution environment
2018/3/7
We introduce a new concept called brokered delegation. Brokered delegation allows users to flexibly delegate credentials and rights for a range of service providers to other users and third parties. W...
Bitcoin provides only pseudo-anonymous transactions, which can be exploited to link payers and payees – defeating the goal of anonymous payments. To thwart such attacks, several Bitcoin mixers have be...
ROTE: Rollback Protection for Trusted Execution
SGX Rollback protection Distributed system
2017/2/20
Intel SGX isolates the runtime memory of protected applications (enclaves) from the OS and allows enclaves to encrypt and authenticate (seal) data for persistent storage. Sealing prevents an untrusted...