2

Private Delegated Computations Using Strong Isolation
Computations are now routinely delegated to third-parties. In response, Confidential Computing technologies are being added to …