Jump to navigation

Trust-aware, REliable and Distributed Information SEcurity in the Cloud

Dissemination

  • Publications
  • Deliverables
  • Communication material
  • Blog

Dissemination

Publications

Towards Shared Ownership in the Cloud

Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy

Verifiable Document Redacting

ROTE: Rollback Protection for Trusted Execution

Is there a “rowhammer” for MLC NAND Flash SSDs? An analysis of filesystem attack vectors

Deliverables

D7.6 - Final Dissemination and Communication activities reporting

D7.8 - Exploitation report and long term sustainability strategy

D6.4 - Final Evaluation report

D6.3 - Use cases development and Deployment

D6.1 - TREDISEC framework implementation

Blog

The End

CLEARBOX

Verifiable Biometric Matching

Feature Extraction Over Encrypted Data

PerfectDedup

Main menu

  • Home
    • About Tredisec
    • Project Structure
    • Security Primitives
    • Use Cases
    • Collaborations
  • Consortium
  • Results
    • Requirements
    • Architecture
    • Catalogue of Primitives
    • Catalogue of Recipes
    • Framework
  • Dissemination
    • Publications
    • Deliverables
    • Communication material
    • Blog
  • Newsroom
    • Events
    • News
  • Q&A

User menu

  • Contact
  • Linkedin
  • twitter
  • Login

The work described in this website has been conducted within the project TREDISEC. This project has received funding from the European Union’s Horizon 2020 (H2020) research and innovation programme under the Grant Agreement no 644412. This website and the content displayed in it do not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of its content.