[1]
S. Anasuri, “Confidential Computing Using Trusted Execution Environments”, IJAIBDCMS, vol. 4, no. 2, pp. 97–110, Jun. 2023, doi: 10.63282/3050-9416.IJAIBDCMS-V4I2P111.