| 0 | -- | 0 | Charles Garcia-Tobin, Mark Knight. Elevating Security with Arm CCA: Attestation and verification are integral to adopting confidential computing |
| 0 | -- | 0 | Thomas A. Limoncelli. Make Two Trips: Larry David's New Year's resolution works for IT too |
| 0 | -- | 0 | Raluca Ada Popa. Confidential Computing or Cryptographic Computing?: Tradeoffs between cryptography and hardware enclaves |
| 0 | -- | 0 | Matthew A. Johnson, Stavros Volos, Ken Gordon, Sean T. Allen, Christoph M. Wintersteiger, Sylvan Clebsch, John Starks, Manuel Costa. Confidential Container Groups: Implementing confidential computing on Azure container instances |
| 0 | -- | 0 | Jinnan Guo, Peter R. Pietzuch, Andrew Paverd, Kapil Vaswani. Trustworthy AI using Confidential Federated Learning: Federated learning and confidential computing are not competing technologies |
| 0 | -- | 0 | George V. Neville-Neil. Structuring Success: The problem with software structure is people don't really learn it until they really need it |
| 0 | -- | 0 | Terence Kelly. Zero Tolerance for Bias |