Safe areas of computation for secure computing with insecure applications | IEEE Conference Publication | IEEE Xplore