A Survey of Published Attacks on Intel SGX A Nilsson, PN Bideh, J Brorsson https://arxiv.org/abs/2006.13598, 2020 | 144 | 2020 |
Evaluating the performance of the OSCORE security protocol in constrained IoT environments M Gunnarsson, J Brorsson, F Palombini, L Seitz, M Tiloca Internet of Things 13, 100333, 2021 | 22 | 2021 |
Papr: Publicly auditable privacy revocation for anonymous credentials J Brorsson, B David, L Gentile, E Pagnin, PS Wagner Cryptographers’ Track at the RSA Conference, 163-190, 2023 | 9 | 2023 |
Guarding the guards: Accountable authorities in vanets J Brorsson, PS Wagner, M Hell 2018 IEEE Vehicular Networking Conference (VNC), 1-4, 2018 | 5 | 2018 |
DIPSAUCE: efficient private stream aggregation without trusted parties J Brorsson, M Gunnarsson Nordic Conference on Secure IT Systems, 204-222, 2023 | 2 | 2023 |
On the suitability of using SGX for secure key storage in the cloud J Brorsson, PN Bideh, A Nilsson, M Hell Trust, Privacy and Security in Digital Business: 17th International …, 2020 | 2 | 2020 |
Compact object security for the internet of things J Brorsson, M Gunnarsson | 2 | 2016 |