Resilient Authenticated Execution of Critical Applications in Untrusted Environments | IEEE Journals & Magazine | IEEE Xplore