3

Securing Cloud File Systems using Shielded Execution
EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale
Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices