Past year
All results
- All results
- Verbatim
Nov 1, 2023 · Find an introduction to the architecture, concepts and algorithms of the Linux kernel in Professional Linux Kernel Architecture.
Jul 16, 2024 · We propose Ascend-CC, a confidential computing architecture based on discrete NPU devices that requires no trust in the host system.
Missing: Distributed | Show results with:Distributed
Feb 15, 2024 · Intel's SGX provides trusted execution environments (TEEs), called enclaves [21, 58]. Enclaves prevent unprivileged access to secure data during security- ...
Jun 26, 2024 · The Trusted Execution Environment (TEE) is designed to establish a safe environment that prevents the execution of unauthenticated programs.
Jul 16, 2024 · ASCEND-CC provides strong security by ensuring data and model encryption that protects not only the data but also the model parameters and operator binaries.
Missing: Distributed | Show results with:Distributed
Jun 28, 2024 · RISC-V has also seen TEE implementations like Keystone Enclave, which provide hardware-based isolation by enabling secure enclaves for sensitive applications.
Jul 23, 2024 · This RISC-V complex, which has its own separate memory, I/O and network-on-chip (NoC) fabric for managing HPSC, is primarily responsible for the health, safety ...
Missing: Guard: | Show results with:Guard:
May 21, 2024 · Beyond-CMOS technologies offer avenues to fortify hardware security through distinct physical properties and nontraditional computing paradigms. These ...
Mar 12, 2024 · They protect and control VOIP networks, enabling secure communication. ... enabling secured computing at residence, temporary and mobile locations around ...
Apr 18, 2024 · Participants who attend this workshop will learn how to: Install a FortiGate device in a network Configure basic routing Create security policies Apply security ...