1![Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1 Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1](https://www.pdfsearch.io/img/17ee7758707dd7b5227620b6db8dba02.jpg) | Add to Reading ListSource URL: cs-www.cs.yale.edu- Date: 2016-02-25 06:27:50
|
---|
2![2015 IEEE Symposium on Security and Privacy VC3: Trustworthy Data Analytics in the Cloud using SGX Felix Schuster∗ , Manuel Costa, C´edric Fournet, Christos Gkantsidis Marcus Peinado, Gloria Mainar-Ruiz, Mark Russino 2015 IEEE Symposium on Security and Privacy VC3: Trustworthy Data Analytics in the Cloud using SGX Felix Schuster∗ , Manuel Costa, C´edric Fournet, Christos Gkantsidis Marcus Peinado, Gloria Mainar-Ruiz, Mark Russino](https://www.pdfsearch.io/img/d1d41332b309bd120cb7eeda9594b02d.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2015-05-11 16:42:59
|
---|
3![Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1 Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1](https://www.pdfsearch.io/img/bb66c6a64de6b6bbe139c9b439298ee1.jpg) | Add to Reading ListSource URL: work.debayangupta.comLanguage: English - Date: 2016-01-22 16:19:24
|
---|
4![Intel® Software Guard Extensions Programming Reference[removed]002US OCTOBER 2014 Intel® Software Guard Extensions Programming Reference[removed]002US OCTOBER 2014](https://www.pdfsearch.io/img/b687861643f6af4326b7140be22e3201.jpg) | Add to Reading ListSource URL: software.intel.comLanguage: English - Date: 2014-10-17 13:01:57
|
---|