Google
×
Past year
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
Jul 16, 2024 · We propose Ascend-CC, a confidential computing architecture based on discrete NPU devices that requires no trust in the host system.
Missing: Distributed | Show results with:Distributed
Feb 15, 2024 · Intel's SGX provides trusted execution environments (TEEs), called enclaves [21, 58]. Enclaves prevent unprivileged access to secure data during security- ...
Jul 16, 2024 · ASCEND-CC provides strong security by ensuring data and model encryption that protects not only the data but also the model parameters and operator binaries.
Missing: Distributed | Show results with:Distributed
Jun 26, 2024 · The Trusted Execution Environment (TEE) is designed to establish a safe environment that prevents the execution of unauthenticated programs.
Jun 28, 2024 · RISC-V has also seen TEE implementations like Keystone Enclave, which provide hardware-based isolation by enabling secure enclaves for sensitive applications.
Jul 23, 2024 · This RISC-V complex, which has its own separate memory, I/O and network-on-chip (NoC) fabric for managing HPSC, is primarily responsible for the health, safety ...
Missing: Guard: | Show results with:Guard:
May 21, 2024 · Beyond-CMOS technologies offer avenues to fortify hardware security through distinct physical properties and nontraditional computing paradigms. These ...
Mar 12, 2024 · They protect and control VOIP networks, enabling secure communication. ... enabling secured computing at residence, temporary and mobile locations around ...
Sep 13, 2024 · Our survey covers hardware and physical access security, hardware-assisted security units, ISA security extensions, memory protection, cryptographic primitives, ...
May 14, 2024 · In response to this highly complex environment, firewalls have become robust multi-functional devices that counter an array of threats to your network.