Confidential computing for serverless workloads: Secure and scalable data processing in untrusted environments
Crossref DOI link: https://doi.org/10.30574/wjaets.2025.14.3.0067
Published Online: 2025-03-30
Update policy: https://doi.org/10.30574/wjaets.ourcrossmarkpolicy
Samarth Shah,
Neil Choksi,