Trusted computation with an adversarial cloud | IEEE Conference Publication | IEEE Xplore