-
Maintaining and running a secure P2P privacy preserving network requires computational resources and has potentially high costs. Peers who reliably offer resources to the commons should be rewarded fo…
-
# Quex Technologies
## Project Description
During this grant period, we're going to implement Q-oracle - a pull-based oracle system capable of securely fetching and verifying data from any web s…
-
This is a proposed new chapter that focuses on how hashing can be used to support reproducibility of analyses. Many projects use sensitive data and/or use secure computational environments, which make…
edaub updated
3 years ago
-
Hello,
i know this is kinda a big task, but your tool is very valuable. but i try to move to "secure" languages. Would it be possible that you support Dhall also? Integration guide is https://docs.d…
-
# Introduction to PUFs
See [PUFs.md](https://github.com/sbellem/qtee/blob/main/PUFs.md).
---
Not sure where it's best to start, but perhaps this article (if you have access):
[Physical unc…
-
#### Speaker name
- Ghada Almashaqbeh
- ghada.almashaqbeh@uconn.edu
#### Institution
- University of Connecticut
#### Suggested topic
Abstract: Existing models for non-interactive MPC can…
-
As I understand, you Lemur doesn't have explicit support for HSMs, as it stores private keys in the postgres db (AFAIK). We would like to use any third-party CA, while offloading some of the computati…
-
## Context
The emulator is starting to be used to create "reader nodes" in production for some dapps where it advances and saves a machine snapshot, then when an inspect comes the saved machine sna…
-
Currently, Solid provides storage and Solid Apps provide computation locally. If a user or an App want to perform server-side computation (e.g. those illustrated in #390), it must be done behind their…
-
We're going to add multisig support to the .stone format, as per-package verification is inherently far more secure than index-based verification.
As part of our build infrastructure, each build ma…