You are currently on the new version of our website. Access the old version .

115 Results Found

  • Article
  • Open Access
1 Citations
4,138 Views
35 Pages

25 October 2025

RISC-V has emerged as a compelling alternative to proprietary instruction set architectures, distinguished by its openness, extensibility, and modularity. As the ecosystem matures, attention has turned to building confidential computing foundations,...

  • Article
  • Open Access
1 Citations
3,010 Views
20 Pages

Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments

  • Souhail Meftah,
  • Shuhao Zhang,
  • Bharadwaj Veeravalli and
  • Khin Mi Mi Aung

25 May 2022

The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for sec...

  • Article
  • Open Access
3 Citations
1,963 Views
19 Pages

26 July 2024

With the world’s data volume growing exponentially, it becomes critical to link it and make decisions. Privacy-preserving record linkage (PPRL) aims to identify all the record information corresponding to the same entity from multiple data sour...

  • Article
  • Open Access
10 Citations
3,617 Views
21 Pages

Secure Sensor Prototype Using Hardware Security Modules and Trusted Execution Environments in a Blockchain Application: Wine Logistic Use Case

  • Antonio J. Cabrera-Gutiérrez,
  • Encarnación Castillo,
  • Antonio Escobar-Molero,
  • Juan Cruz-Cozar,
  • Diego P. Morales and
  • Luis Parrilla

The security of Industrial Internet of Things (IIoT) systems is a challenge that needs to be addressed immediately, as the increasing use of new communication paradigms and the abundant use of sensors opens up new opportunities to compromise these ty...

  • Article
  • Open Access
3 Citations
2,218 Views
18 Pages

30 June 2023

The traditional centralized power trading model suffers from high maintenance costs, low processing efficiency and unsynchronized information, and it cannot adapt to the high-frequency and small-dollar distributed energy trading scenario. To address...

  • Article
  • Open Access
1 Citations
2,412 Views
19 Pages

TeeDFuzzer: Fuzzing Trusted Execution Environment

  • Sheng Wen,
  • Liam Xu,
  • Liwei Tian,
  • Suping Liu and
  • Yong Ding

The Trusted Execution Environment (TEE) is crucial for safeguarding the ecosystem of embedded systems. It uses isolation to minimize the TCB (Trusted Computing Base) and protect sensitive software. It is vital because devices handle vast, potentially...

  • Article
  • Open Access
8 Citations
3,476 Views
21 Pages

The rapid growth of electronic health (eHealth) systems has led to serious security and privacy challenges, highlighting the critical importance of protecting sensitive healthcare data. Although researchers have employed blockchain to tackle data man...

  • Feature Paper
  • Article
  • Open Access
4 Citations
5,802 Views
24 Pages

A Trusted Execution Environment RISC-V System-on-Chip Compatible with Transport Layer Security 1.3

  • Binh Kieu-Do-Nguyen,
  • Khai-Duy Nguyen,
  • Tuan-Kiet Dang,
  • Nguyen The Binh,
  • Cuong Pham-Quoc,
  • Ngoc-Thinh Tran,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

The Trusted Execution Environment (TEE) is designed to establish a safe environment that prevents the execution of unauthenticated programs. The nature of TEE is a continuous verification process with hashing, signing, and verifying. Such a process i...

  • Article
  • Open Access
15 Citations
3,826 Views
15 Pages

3 June 2020

Crowdsensing applications provide platforms for sharing sensing data collected by mobile devices. A blockchain system has the potential to replace a traditional centralized trusted third party for crowdsensing services to perform operations that invo...

  • Article
  • Open Access
7 Citations
3,328 Views
15 Pages

18 September 2023

In the face of increasing concerns around privacy and security in the use of unmanned aerial vehicles (UAVs) for mobile edge computing (MEC), this study proposes a novel approach to secure UAV-assisted federated learning. This research integrates a t...

  • Article
  • Open Access
24 Citations
4,753 Views
19 Pages

IoT Access Control Model Based on Blockchain and Trusted Execution Environment

  • Weijin Jiang,
  • En Li,
  • Wenying Zhou,
  • Ying Yang and
  • Tiantian Luo

28 February 2023

With the application and popularization of the Internet of Things (IoT), while the IoT devices bring us intelligence and convenience, the privacy protection issue has gradually attracted people’s attention. Access control technology is one of t...

  • Article
  • Open Access
8 Citations
3,936 Views
19 Pages

1 September 2023

Federated learning has emerged as a promising technique for the Internet of Things (IoT) in various domains, including supply chain management. It enables IoT devices to collaboratively learn without exposing their raw data, ensuring data privacy. Ho...

  • Article
  • Open Access
1,327 Views
23 Pages

Mitigating Randomness Leakage in SM2 White-Box Implementations via Trusted Execution Environments

  • Hongyu Zhu,
  • Yubo Song,
  • Yang Li,
  • Weiqiang Luo,
  • Jianwei Tian,
  • Fangliao Yang,
  • Wenchang Liu,
  • Yi Gong and
  • Ding Li

White-box cryptography plays a vital role in untrusted environments where attackers can fully access the execution process and potentially expose cryptographic keys. It secures keys by embedding them within complex and obfuscated transformations, suc...

  • Article
  • Open Access
2 Citations
3,645 Views
24 Pages

13 January 2025

With the extensive deployment and application of the Internet of Things (IoT), 5G and 6G technologies and edge intelligence, the volume of data generated by IoT and the number of intelligence applications derived from these data are rapidly growing....

  • Article
  • Open Access
1 Citations
1,894 Views
19 Pages

An Efficient Greedy Hierarchical Federated Learning Training Method Based on Trusted Execution Environments

  • Jiaxing Yan,
  • Yan Li,
  • Sifan Yin,
  • Xin Kang,
  • Jiachen Wang,
  • Hao Zhang and
  • Bin Hu

6 September 2024

With the continuous development of artificial intelligence, effectively solving the problem of data islands under the premise of protecting user data privacy has become a top priority. Federal learning is an effective solution to the two significant...

  • Article
  • Open Access
1 Citations
1,916 Views
22 Pages

Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments

  • Luca Crocetti,
  • Pietro Nannipieri,
  • Stefano Di Matteo and
  • Sergio Saponara

30 November 2023

Cyberattacks and cybercriminal activities constitute one of the biggest threats in the modern digital era, and the frequency, efficiency, and severity of attacks have grown over the years. Designers and producers of digital systems try to counteract...

  • Article
  • Open Access
22 Citations
8,179 Views
46 Pages

Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone

  • Nikolaos Koutroumpouchos,
  • Christoforos Ntantogian and
  • Christos Xenakis

13 January 2021

TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. Although TEEs have been promoted as the starting point for...

  • Article
  • Open Access
2 Citations
6,427 Views
18 Pages

MiniTEE—A Lightweight TrustZone-Assisted TEE for Real-Time Systems

  • Songran Liu,
  • Nan Guan,
  • Zhishan Guo and
  • Wang Yi

While trusted execution environments (TEEs) provide industry standard security and isolation, TEE requests through secure monitor calls (SMCs) attribute to large time overhead and weakened temporal predictability. Moreover, as current available TEE s...

  • Article
  • Open Access
1 Citations
3,096 Views
17 Pages

7 August 2024

Cloud computing, as the most widely applied and prominent domain of distributed systems, has brought numerous advantages to users, including high resource sharing efficiency, strong availability, and excellent scalability. However, the complexity of...

  • Article
  • Open Access
45 Citations
6,144 Views
21 Pages

Interoperable Blockchains for Highly-Integrated Supply Chains in Collaborative Manufacturing

  • Paolo Bellavista,
  • Christian Esposito,
  • Luca Foschini,
  • Carlo Giannelli,
  • Nicola Mazzocca and
  • Rebecca Montanari

21 July 2021

Blockchain technology plays a pivotal role in the undergoing fourth industrial revolution or Industry 4.0. It is considered a tremendous boost to company digitalization; thus, considerable investments in blockchain are being made. However, there is n...

  • Article
  • Open Access
1 Citations
1,144 Views
25 Pages

17 September 2025

Blockchain sharding is a promising approach to improving system scalability. However, traditional designs rely on lock-based cross-shard commit protocols, which introduce significant performance bottlenecks due to repeated on-chain communication and...

  • Article
  • Open Access
1 Citations
2,121 Views
38 Pages

Secure Partitioning of Cloud Applications, with Cost Look-Ahead

  • Alessandro Bocci,
  • Stefano Forti,
  • Roberto Guanciale,
  • Gian-Luigi Ferrari and
  • Antonio Brogi

The security of Cloud applications is a major concern for application developers and operators. Protecting users’ data confidentiality requires methods to avoid leakage from vulnerable software and unreliable Cloud providers. Recently, trusted...

  • Article
  • Open Access
21 Citations
4,028 Views
25 Pages

A Sustainable Approach to Delivering Programmable Peer-to-Peer Offline Payments

  • Luca Mainetti,
  • Matteo Aprile,
  • Emanuele Mele and
  • Roberto Vergallo

25 January 2023

Payment apps and digital wallets are powerful tools used to exchange e-money via the internet. However, with the progressive disappearance of cash, there is a need for the digital equivalent of physical banknotes to guarantee the same level of anonym...

  • Feature Paper
  • Article
  • Open Access
6 Citations
3,950 Views
12 Pages

Reinforcing SLA Consensus on Blockchain

  • Nikolaos Kapsoulis,
  • Alexandros Psychas,
  • Antonios Litke and
  • Theodora Varvarigou

26 November 2021

Cloud Infrastructure as a Service (IaaS) Service Level Agreements (SLAs) assessment constitutes the de facto area of interest and applications in the public cloud infrastructure. However, the domination of colossal corporations tends to monopolize th...

  • Article
  • Open Access
2 Citations
4,803 Views
25 Pages

Secure Multiparty Computation Using Secure Virtual Machines

  • Danko Miladinović,
  • Adrian Milaković,
  • Maja Vukasović,
  • Žarko Stanisavljević and
  • Pavle Vuletić

The development of new processor capabilities which enable hardware-based memory encryption, capable of isolating and encrypting application code and data in memory, have led to the rise of confidential computing techniques that protect data when pro...

  • Article
  • Open Access
7 Citations
3,233 Views
13 Pages

SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search

  • Hyundo Yoon,
  • Soojung Moon,
  • Youngki Kim,
  • Changhee Hahn,
  • Wonjun Lee and
  • Junbeom Hur

5 November 2020

Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries...

  • Review
  • Open Access
13 Citations
9,086 Views
24 Pages

Privacy-Preserving Blockchain Technologies

  • Dalton Cézane Gomes Valadares,
  • Angelo Perkusich,
  • Aldenor Falcão Martins,
  • Mohammed B. Alshawki and
  • Chris Seline

14 August 2023

The main characteristics of blockchains, such as security and traceability, have enabled their use in many distinct scenarios, such as the rise of new cryptocurrencies and decentralized applications (dApps). However, part of the information exchanged...

  • Article
  • Open Access
7 Citations
4,286 Views
18 Pages

DITES: A Lightweight and Flexible Dual-Core Isolated Trusted Execution SoC Based on RISC-V

  • Yuehai Chen,
  • Huarun Chen,
  • Shaozhen Chen,
  • Chao Han,
  • Wujian Ye,
  • Yijun Liu and
  • Huihui Zhou

10 August 2022

A Trusted Execution Environment (TEE) is an efficient way to secure information. To obtain higher efficiency, the building of a dual-core system-on-chip (SoC) with TEE security capabilities is the hottest topic. However, TEE SoCs currently commonly u...

  • Article
  • Open Access
7 Citations
4,146 Views
18 Pages

In bioinformatics, genome-wide association studies (GWAS) are used to detect associations between single-nucleotide polymorphisms (SNPs) and phenotypic traits such as diseases. Significant differences in SNP counts between case and control groups can...

  • Article
  • Open Access
5 Citations
8,532 Views
26 Pages

31 October 2024

As Android devices become more prevalent, their security risks extend beyond software vulnerabilities to include critical hardware weaknesses. This paper provides a comprehensive and systematic review of hardware-related vulnerabilities in Android sy...

  • Review
  • Open Access
41 Citations
14,536 Views
28 Pages

Review of Offline Payment Function of CBDC Considering Security Requirements

  • Yeonouk Chu,
  • Jaeho Lee,
  • Sungjoong Kim,
  • Hyunjoong Kim,
  • Yongtae Yoon and
  • Hyeyoung Chung

28 April 2022

Due to the growth of the internet and communication technologies, electronic financial systems are becoming popular. Physical cash is losing its preeminence, and digital numbers on computers represent money. However, electronic financial systems, mos...

  • Article
  • Open Access
6 Citations
3,705 Views
29 Pages

Three-dimensional (3D) data are easily collected in an unconscious way and are sensitive to lead biological characteristics exposure. Privacy and ownership have become important disputed issues for the 3D data application field. In this paper, we des...

  • Article
  • Open Access

This paper proposes a process-aware, tag-based digital identity framework that enhances interoperability while enabling identity unlinkability and selective disclosure across multi-party workflows involving sensitive data. We realize this framework w...

  • Article
  • Open Access
9 Citations
5,238 Views
21 Pages

Trusted Operations on Sensor Data

  • Hassaan Janjua,
  • Wouter Joosen,
  • Sam Michiels and
  • Danny Hughes

27 April 2018

The widespread use of mobile devices has allowed the development of participatory sensing systems that capture various types of data using the existing or external sensors attached to mobile devices. Gathering data from such anonymous sources require...

  • Article
  • Open Access
2 Citations
1,399 Views
21 Pages

6 February 2025

With the advent of cloud computing, outsourced computing has emerged as an increasingly popular strategy to reduce the burden of local computation. Optimal location query (OLQ) is a computationally intensive task in the domain of big data outsourcing...

  • Article
  • Open Access
2 Citations
3,169 Views
21 Pages

25 October 2022

Generally, biometric authentication is conducted either by mobile terminals in local-processing mode or by public servers in centralized-processing mode. In the former mode, each user has full control of his/her biometric data, but the authentication...

  • Article
  • Open Access
6 Citations
4,666 Views
17 Pages

A TEE-Based Federated Privacy Protection Method: Proposal and Implementation

  • Libo Zhang,
  • Bing Duan,
  • Jinlong Li,
  • Zhan’gang Ma and
  • Xixin Cao

22 April 2024

With the continuous enhancement of privacy protection globally, there is a problem for the traditional machine learning paradigm, which is that training data cannot be obtained from a single place. Federated learning is considered a viable technique...

  • Review
  • Open Access
4 Citations
3,763 Views
31 Pages

13 May 2025

Ensuring the safe, reliable, and energy-efficient provision of electricity is a complex task for smart grid (SG) management applications. Internet of Things (IoT) and edge computing-based SG applications have been proposed for time-responsive monitor...

  • Article
  • Open Access
2 Citations
2,632 Views
18 Pages

Implementation of an Image Tampering Detection System with a CMOS Image Sensor PUF and OP-TEE

  • Tatsuya Oyama,
  • Manami Hagizaki,
  • Shunsuke Okura and
  • Takeshi Fujino

5 November 2024

Since image recognition systems use image data acquired by image sensors for analysis by AI technology, an important security issue is guaranteeing the authenticity of data transmitted from image sensors to successfully perform inference using AI. Th...

  • Article
  • Open Access
3 Citations
3,984 Views
19 Pages

A Novel Auction Blockchain System with Price Recommendation and Trusted Execution Environment

  • Dong-Her Shih,
  • Ting-Wei Wu,
  • Ming-Hung Shih,
  • Wei-Cheng Tsai and
  • David C. Yen

13 December 2021

Online auctions are now widely used, with all the convenience and efficiency brought by internet technology. Despite the advantages over traditional auction methods, some challenges still remain in online auctions. According to the World Business Env...

  • Article
  • Open Access
27 Citations
4,786 Views
19 Pages

A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust

  • Francisco José Mora-Gimeno,
  • Higinio Mora-Mora,
  • Diego Marcos-Jorquera and
  • Bruno Volckaert

23 September 2018

Current mobile devices need to run applications with high computational demands and critical response times. The mobile edge computing (MEC) paradigm was developed to improve the performance of these devices. This new computation architecture allows...

  • Article
  • Open Access
1,553 Views
24 Pages

1 August 2025

Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter...

  • Article
  • Open Access
592 Views
17 Pages

29 August 2025

This paper proposes a collaborative framework to support task offloading in connected vehicular environments. The approach relies on the dynamic formation of temporary teams of connected vehicles in a mobile edge computing scenario. A novel trust mod...

  • Article
  • Open Access
9 Citations
4,591 Views
16 Pages

10 March 2023

Hyperledger Fabric is a distributed ledger solution platform based on a modular architecture. The cryptographic algorithm is the core of the platform to ensure the security and tamper-resistant of the data on the chain. However, the original Fabric p...

  • Article
  • Open Access
1 Citations
3,153 Views
14 Pages

Can We Trust Edge Computing Simulations? An Experimental Assessment

  • Gonçalo Carvalho,
  • Filipe Magalhães,
  • Bruno Cabral,
  • Vasco Pereira and
  • Jorge Bernardino

Simulators allow for the simulation of real-world environments that would otherwise be financially costly and difficult to implement at a technical level. Thus, a simulation environment facilitates the implementation and development of use cases, ren...

  • Article
  • Open Access
4 Citations
3,358 Views
18 Pages

7 November 2023

In an increasingly open innovation environment, executives, as the core of corporate management and the main body of decision-making and execution, play a significant role in implementing innovation-driven development strategies. Based on executives&...

  • Article
  • Open Access
5 Citations
2,736 Views
15 Pages

28 September 2022

The TrustZone technology is incorporated in a majority of recent ARM Cortex A and Cortex M processors widely deployed in the IoT world. Security critical code execution inside a so-called secure world is isolated from the rest of the application exec...

  • Article
  • Open Access
1 Citations
3,568 Views
28 Pages

ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System

  • Annapureddy Venkata Sai Kumar Reddy and
  • Gourinath Banda

16 December 2024

The widespread reliance on paper-based currency poses significant drawbacks, such as counterfeiting, lack of transparency, and environmental impacts. While Central Bank Digital Currencies (CBDCs) address many of these issues, their dependence on cont...

  • Article
  • Open Access
4 Citations
42,765 Views
41 Pages

Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations

  • Vedran Dakić,
  • Zlatan Morić,
  • Ana Kapulica and
  • Damir Regvart

The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA to enfor...

  • Article
  • Open Access
6 Citations
2,886 Views
28 Pages

29 November 2023

The novel contribution of this research is decentralised IOTA-based concepts of digital trust for securing remote driving in an urban environment. The conceptual solutions are studied and described, and respective experimental solutions are developed...

of 3