Proceedings of the 2nd International Conference on Cryptography, Security and Privacy 2018
DOI: 10.1145/3199478.3199508
|View full text |Cite
|
Sign up to set email alerts
|

Dna-X

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…At present, some scholars have applied SGX to other environments to design schemes. Sun et al [25] used SGX to design schemes to better protect dynamic identity authentication. Liu et al [26] devised an AKA scheme that applies SGX to wireless sensor networks (WSNs).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…At present, some scholars have applied SGX to other environments to design schemes. Sun et al [25] used SGX to design schemes to better protect dynamic identity authentication. Liu et al [26] devised an AKA scheme that applies SGX to wireless sensor networks (WSNs).…”
Section: Related Workmentioning
confidence: 99%
“…At present, some scholars protect users' privacy through differential privacy [15], quick response (QR) code [16] and other technologies, and many scholars have proposed many authentication and key agreement (AKA) schemes [13,[17][18][19][20][21][22][23][24] to protect the confidentiality and security of transmitted information, but most of their schemes have various security problems, such as unable to achieve mutual authentication, unable to resist offline password guessing (OPG) attacks, insider attacks, impersonation attacks, etc. In order to protect and improve the security of information, Intel has proposed a new set of CPU instruction extensions called software guard extensions (SGX) [25,26] technology. It is a kind of hardware that can create a trusted execution environment (TEE) to protect code and data, which even high-level system software cannot access.…”
Section: Introductionmentioning
confidence: 99%
“…Fisch et al [41] constructed a provably secure and practical functional encryption mechanism using Intel SGX and showed that the performance of this mechanism exceeded the known encryption schemes. Sun et al [42] proposed a dynamic network identity authentication scheme using SGX, which can continuously update the key. Conde et al [43] designed and implemented an identity authentication module based on SGX in a Unix operating system.…”
Section: Related Workmentioning
confidence: 99%