The main premise of federated learning (FL) is that machine learning mod...
Traditional email encryption schemes are vulnerable to EFail attacks, wh...
The VEDLIoT project aims to develop energy-efficient Deep Learning
metho...
Modern NVMM is closing the gap between DRAM and persistent storage, both...
The popularity of the Java programming language has led to its wide adop...
Intel's software guard extensions (SGX) provide hardware enclaves to
gua...
The VEDLIoT project targets the development of energy-efficient Deep Lea...
Over the last decade, the cloud computing landscape has transformed from...
WebAssembly (Wasm) is a novel low-level bytecode format that swiftly gai...
Fault-tolerance techniques depend on replication to enhance availability...
Attestation is a fundamental building block to establish trust over soft...
Attestation is a fundamental building block to establish trust over soft...
Latest ARM processors are approaching the computational power of x86
arc...
This paper introduces NVCache, an approach that uses a non-volatile main...
Major cloud providers such as Amazon, Google and Microsoft provide nowad...
With the increasing popularity of cloud based machine learning (ML)
tech...
WebAssembly is an increasingly popular lightweight binary instruction fo...
Network appliances continue to offer novel opportunities to offload
proc...
Trusted Execution Environments (TEEs), such as Intel Software Guard
eXte...
DNN learning jobs are common in today's clusters due to the advances in ...
Blockchain technology promises to revolutionize manufacturing industries...
Serverless computing has become a major trend among cloud providers. Wit...
With the advent of the Internet of Things (IoT), the ever growing number...
Trust is arguably the most important challenge for critical services bot...
Concurrency has been a subject of study for more than 50 years. Still, m...
This paper presents our preliminary results with ABEONA, an edge-to-clou...
Network management on multi-tenant container-based data centers has crit...
The growing availability of hardware-based trusted execution environment...
Today's big data clusters based on the MapReduce paradigm are capable of...
Using public cloud services for storing and sharing confidential data
re...
Malware attacks represent a significant part of today's security threats...
Cloud providers usually offer diverse types of hardware for their users....
The latest generation of Intel processors supports Software Guard Extens...
The implementation, deployment and testing of secure services for Intern...
The deployment of large-scale distributed systems, e.g., publish-subscri...
This paper presents PUBSUB-SGX, a content-based publish-subscribe system...
Data centres that use consumer-grade disks drives and distributed
peer-t...
Containers are becoming the de facto standard to package and deploy
appl...
We present the SecureCloud EU Horizon 2020 project, whose goal is to ena...
The growing adoption of distributed data processing frameworks in a wide...
The exploitation of user search queries by search engines is at the hear...
While many cloud storage systems allow users to protect their data by ma...
By regularly querying Web search engines, users (unconsciously) disclose...
In this paper we propose a data dissemination platform that supports dat...