搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Saerom Park , Seongmin Kim , Yeon-sup Lim
DOI:
关键词:
摘要: … To cope with these threats, we introduce D1-D2 based on confidential computing with executing multiple enclaves in a public cloud infrastructure. D1. Secure transmission of sensitive …