Jump to navigation
T
rust-aware,
RE
liable and
D
istributed
I
nformation
SE
curity in the
C
loud
Dissemination
Publications
Deliverables
Communication material
Blog
Dissemination
Publications
Towards Shared Ownership in the Cloud
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Verifiable Document Redacting
ROTE: Rollback Protection for Trusted Execution
Is there a “rowhammer” for MLC NAND Flash SSDs? An analysis of filesystem attack vectors
Deliverables
D7.6 - Final Dissemination and Communication activities reporting
D7.8 - Exploitation report and long term sustainability strategy
D6.4 - Final Evaluation report
D6.3 - Use cases development and Deployment
D6.1 - TREDISEC framework implementation
Blog
The End
CLEARBOX
Verifiable Biometric Matching
Feature Extraction Over Encrypted Data
PerfectDedup
Main menu
Home
About Tredisec
Project Structure
Security Primitives
Use Cases
Collaborations
Consortium
Results
Requirements
Architecture
Catalogue of Primitives
Catalogue of Recipes
Framework
Dissemination
Publications
Deliverables
Communication material
Blog
Newsroom
Events
News
Q&A
User menu
Contact
Linkedin
twitter
Login