Exploring the use of Intel SGX for secure many-party applications KA Küçük, A Paverd, A Martin, N Asokan, A Simpson, R Ankele Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016 | 57 | 2016 |
Face-gear drive: Geometry generation and tooth contact analysis HA Zschippang, S Weikert, KA Küçük, K Wegener Mechanism and Machine Theory 142, 103576, 2019 | 53 | 2019 |
Face-gear drive: Assessment of load sharing, transmission characteristics and root stress based on a quasi-static analysis HA Zschippang, N Lanz, KA Küçük, S Weikert, K Wegener Mechanism and Machine Theory 151, 103914, 2020 | 19 | 2020 |
Applying the trustworthy remote entity to privacy-preserving multiparty computation: Requirements and criteria for large-scale applications R Ankele, KA Küçük, A Martin, A Simpson, A Paverd 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016 | 19 | 2016 |
Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves: Minimised TCB on secret-code execution with Early Private Mode (EPM) KA Küçük, D Grawrock, A Martin EURASIP Journal on Information Security 2019, 1-22, 2019 | 7 | 2019 |
SoK: How Not to Architect Your Next-Generation TEE Malware? KA Küçük, S Moyle, A Martin, A Mereacre, N Allott Hardware and Architectural Support for Security and Privacy (HASP) 2022, 10, 2022 | 2 | 2022 |
CRC: Fully General Model of Confidential Remote Computing KA Küçük, A Martin arXiv preprint arXiv:2104.03868, 2021 | 1 | 2021 |
Framework of secret differential privacy on private data A Küçük, A Martin Secure Systems Annual Demo Day, 2017 | 1 | 2017 |
Confidential Remote Computing KA Küçük, A Martin, I Martinovic, C Mitchell https://ora.ox.ac.uk/objects/uuid:aaad767e-debd-40e9-a51f-712c1b55c4fc, 2023 | | 2023 |