Feb. 24, 2023, 2:10 a.m. | Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng

cs.CR updates on arXiv.org arxiv.org

As an essential technology underpinning trusted computing, the trusted
execution environment (TEE) allows one to launch computation tasks on both on-
and off-premises data while assuring confidentiality and integrity. This
article provides a systematic review and comparison of TEE-based secure
computation protocols. We first propose a taxonomy that classifies secure
computation protocols into three major categories, namely secure outsourced
computation, secure distributed computation and secure multi-party computation.
To enable a fair comparison of these protocols, we also present comprehensive
assessment …

article computation computing confidentiality data distributed enable environment environments integrity major party protocols review secure computation survey technology trusted execution environment

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Security Engineer II- Full stack Java with React

@ JPMorgan Chase & Co. | Hyderabad, Telangana, India

Cybersecurity SecOps

@ GFT Technologies | Mexico City, MX, 11850

Senior Information Security Advisor

@ Sun Life | Sun Life Toronto One York

Contract Special Security Officer (CSSO) - Top Secret Clearance

@ SpaceX | Hawthorne, CA

Early Career Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts