Journal: IEEE Security & Privacy
Loading...
Abbreviation
IEEE secur. priv.
Publisher
IEEE
16 results
Search Results
Publications1 - 10 of 16
- Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic?Item type: Review Article
IEEE Security & PrivacyGugelmann, David; Studerus, Pascal; Lenders, Vincent; et al. (2015) - Building Open Trusted Execution EnvironmentsItem type: Journal Article
IEEE Security & PrivacyKohlbrenner, David; Shinde, Shweta; Lee, Dayeol; et al. (2020)Trusted execution environments (TEEs) are a growing part of the security ecosystem. Unfortunately, widely available TEEs are hampered by closed designs and a lack of flexibility. We outline the challenges to TEEs, advocate for extensible and portable open TEEs, and detail current efforts. © 2020 IEEE. - Improving the Security of Cryptographic Protocol StandardsItem type: Journal Article
IEEE Security & PrivacyBasin, David; Cremers, Cas; Miyazaki, Kunihiko; et al. (2015) - On Secure Data DeletionItem type: Journal Article
IEEE Security & PrivacyReardon, Joel; Basin, David; Capkun, Srdjan (2014) - Analysis of a Hardware Security Module's High-Availability SettingItem type: Journal Article
IEEE Security & PrivacyKöppel, Benedikt; Neuhaus, Stephan (2013) - The Untapped Potential of Trusted Execution Environments on Mobile DevicesItem type: Journal Article
IEEE Security & PrivacyEkberg, Jan-Erik; Kostiainen, Kari; Asokan, N. (2014) - Blockchain Security and PrivacyItem type: Other Journal Item
IEEE Security & PrivacyKarame, Ghassan; Capkun, Srdjan (2018) - End-to-End Encrypted Cloud StorageItem type: Journal Article
IEEE Security & PrivacyBackendal, Matilda; Haller, Miro; Paterson, Kenny (2024)End-to-end encryption is rapidly becoming the accepted security goal for personal data. In this article, we examine consumer cloud storage systems, focusing in particular on those systems that attempt to provide end-to-end security for customer data. We survey the security guarantees of current service providers and the issues they face, discuss open research questions, and highlight the challenges that impede the deployment of end-to-end secure cloud storage. - Usage control enforcement - Present and futureItem type: Journal Article
IEEE Security & PrivacyPretschner, Alexander; Hilty, Manuel; Schuetz, Florian; et al. (2008) - Is Bitcoin a Decentralized Currency?Item type: Journal Article
IEEE Security & PrivacyGervais, Arthur; Karame, Ghassan O.; Capkun, Vedran; et al. (2014)
Publications1 - 10 of 16