WANG Wubing, LIU Bo, FAN Yuan, TAO Lifeng, XU Dongde. A design and security analysis of the confidential computing architecture based on trusted execution environment[J]. Information and Communications Technology and Policy, 2022, 48(8): 8-18.
MINAMI M, SUZAKI K, OKUMURA T. Security considered harmful a case study of tradeoff between security and usability[C]. IEEE, 2011.
[5]
Confidential Computing Consortium. Atechnical analysis of confidential computing, v1.1[R], 2021.
[6]
THILAK K D, AMUTHAN A. DoS attack on VANET routing and possible defending solutions-a survey[C]// 2016 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2016.
[7]
SINGH S K, SINGH M P, SINGH D K. A survey on network security and attack defense mechanism for wireless sensor networks[J]. International Journal of Computer Trends & Technology, 2011.
[8]
UNGER N, DECHAND S, BONNEAU J, et al. Sok: secure messaging[C]// 2015 IEEE Symposium on Security and Privacy. IEEE, 2015.