Fig. 1From: Confidential computing and related technologies: a critical reviewVenn diagram, illustrating technologies for secure computation, produced by Confidential Computing Consortium (CCC) as a result of a survey (2021a)Back to article page