Search dblp for Publications

export results for "stream:streams/conf/trust:"

 download as .bib file

@inproceedings{DBLP:conf/trust/BeckKPS16,
  author       = {Michael Till Beck and
                  Stephan Krenn and
                  Franz{-}Stefan Preiss and
                  Kai Samelin},
  editor       = {Michael Franz and
                  Panos Papadimitratos},
  title        = {Practical Signing-Right Revocation},
  booktitle    = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
                  2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9824},
  pages        = {21--39},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45572-3\_2},
  doi          = {10.1007/978-3-319-45572-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BeckKPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/CamenischDL16,
  author       = {Jan Camenisch and
                  Manu Drijvers and
                  Anja Lehmann},
  editor       = {Michael Franz and
                  Panos Papadimitratos},
  title        = {Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited},
  booktitle    = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
                  2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9824},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45572-3\_1},
  doi          = {10.1007/978-3-319-45572-3\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/CamenischDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HupperichKH16,
  author       = {Thomas Hupperich and
                  Katharina Krombholz and
                  Thorsten Holz},
  editor       = {Michael Franz and
                  Panos Papadimitratos},
  title        = {Sensor Captchas: On the Usability of Instrumenting Hardware Sensors
                  to Prove Liveliness},
  booktitle    = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
                  2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9824},
  pages        = {40--59},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45572-3\_3},
  doi          = {10.1007/978-3-319-45572-3\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HupperichKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KarlssonH16,
  author       = {Linus Karlsson and
                  Martin Hell},
  editor       = {Michael Franz and
                  Panos Papadimitratos},
  title        = {Enabling Key Migration Between Non-compatible {TPM} Versions},
  booktitle    = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
                  2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9824},
  pages        = {101--118},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45572-3\_6},
  doi          = {10.1007/978-3-319-45572-3\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/KarlssonH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Neugschwandtner16,
  author       = {Matthias Neugschwandtner and
                  Collin Mulliner and
                  William K. Robertson and
                  Engin Kirda},
  editor       = {Michael Franz and
                  Panos Papadimitratos},
  title        = {Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded
                  Devices},
  booktitle    = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
                  2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9824},
  pages        = {60--81},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45572-3\_4},
  doi          = {10.1007/978-3-319-45572-3\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Neugschwandtner16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Rowe16,
  author       = {Paul D. Rowe},
  editor       = {Michael Franz and
                  Panos Papadimitratos},
  title        = {Bundling Evidence for Layered Attestation},
  booktitle    = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
                  2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9824},
  pages        = {119--139},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45572-3\_7},
  doi          = {10.1007/978-3-319-45572-3\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Rowe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SpenkeBP16,
  author       = {Alexander Spenke and
                  Ralph Breithaupt and
                  Rainer Plaga},
  editor       = {Michael Franz and
                  Panos Papadimitratos},
  title        = {An Arbiter {PUF} Secured by Remote Random Reconfigurations of an {FPGA}},
  booktitle    = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
                  2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9824},
  pages        = {140--158},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45572-3\_8},
  doi          = {10.1007/978-3-319-45572-3\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SpenkeBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZicariIPTG16,
  author       = {Paolo Zicari and
                  Roberto Interdonato and
                  Diego Perna and
                  Andrea Tagarelli and
                  Sergio Greco},
  editor       = {Michael Franz and
                  Panos Papadimitratos},
  title        = {Controversy in Trust Networks},
  booktitle    = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
                  2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9824},
  pages        = {82--100},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45572-3\_5},
  doi          = {10.1007/978-3-319-45572-3\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZicariIPTG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2016,
  editor       = {Michael Franz and
                  Panos Papadimitratos},
  title        = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
                  2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9824},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45572-3},
  doi          = {10.1007/978-3-319-45572-3},
  isbn         = {978-3-319-45571-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ArmknechtKMYZ15,
  author       = {Frederik Armknecht and
                  Ghassan O. Karame and
                  Avikarsha Mandal and
                  Franck Youssef and
                  Erik Zenner},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Ripple: Overview and Outlook},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {163--180},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_10},
  doi          = {10.1007/978-3-319-22846-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ArmknechtKMYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BhattacharyaHA15,
  author       = {Sourav Bhattacharya and
                  Otto Huhta and
                  N. Asokan},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {LookAhead: Augmenting Crowdsourced Website Reputation Systems with
                  Predictive Modeling},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {143--162},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_9},
  doi          = {10.1007/978-3-319-22846-4\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/BhattacharyaHA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ChenRNSS15,
  author       = {Qingqing Chen and
                  Ulrich R{\"{u}}hrmair and
                  Spoorthy Narayana and
                  Uzair Sharif and
                  Ulf Schlichtmann},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {{MWA} Skew {SRAM} Based {SIMPL} Systems for Public-Key Physical Cryptography},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {268--282},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_16},
  doi          = {10.1007/978-3-319-22846-4\_16},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ChenRNSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ChenU15,
  author       = {Liqun Chen and
                  Rainer Urian},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {{DAA-A:} Direct Anonymous Attestation with Attributes},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_14},
  doi          = {10.1007/978-3-319-22846-4\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ChenU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ColesaLTCP15,
  author       = {Adrian Colesa and
                  S{\'{a}}ndor Luk{\'{a}}cs and
                  Vlad Topan and
                  Radu Ciocas and
                  Adrian Pop},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Efficient Provisioning of a Trustworthy Environment for Security-Sensitive
                  Applications},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {300--309},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_18},
  doi          = {10.1007/978-3-319-22846-4\_18},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ColesaLTCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ForsterLZK15,
  author       = {David F{\"{o}}rster and
                  Hans L{\"{o}}hr and
                  Jan Zibuschka and
                  Frank Kargl},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {{REWIRE} - Revocation Without Resolution: {A} Privacy-Friendly Revocation
                  Mechanism for Vehicular Ad-Hoc Networks},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {193--208},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_12},
  doi          = {10.1007/978-3-319-22846-4\_12},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ForsterLZK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/GanjiTS15,
  author       = {Fatemeh Ganji and
                  Shahin Tajik and
                  Jean{-}Pierre Seifert},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Why Attackers Win: On the Learnability of {XOR} Arbiter PUFs},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {22--39},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_2},
  doi          = {10.1007/978-3-319-22846-4\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/GanjiTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KanakakisGKV15,
  author       = {Michalis Kanakakis and
                  Shenja van der Graaf and
                  Costas Kalogiros and
                  Wim Vanobberghen},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Computing Trust Levels Based on User's Personality and Observed System
                  Trustworthiness},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {71--87},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_5},
  doi          = {10.1007/978-3-319-22846-4\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KanakakisGKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KarameL15,
  author       = {Ghassan O. Karame and
                  Wenting Li},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Secure Erasure and Code Update in Legacy Sensors},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {283--299},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_17},
  doi          = {10.1007/978-3-319-22846-4\_17},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/KarameL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KoeberlPRS0Z15,
  author       = {Patrick Koeberl and
                  Vinay Phegade and
                  Anand Rajan and
                  Thomas Schneider and
                  Steffen Schulz and
                  Maria Zhdanova},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Time to Rethink: Trust Brokerage Using Trusted Execution Environments},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {181--190},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_11},
  doi          = {10.1007/978-3-319-22846-4\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KoeberlPRS0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KohnhauserS015,
  author       = {Florian Kohnh{\"{a}}user and
                  Andr{\'{e}} Schaller and
                  Stefan Katzenbeisser},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {PUF-Based Software Protection for Low-End Embedded Devices},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_1},
  doi          = {10.1007/978-3-319-22846-4\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KohnhauserS015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LutasLCL15,
  author       = {Andrei Lutas and
                  S{\'{a}}ndor Luk{\'{a}}cs and
                  Adrian Colesa and
                  Dan Lutas},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Proposed Processor Extensions for Significant Speedup of Hypervisor
                  Memory Introspection},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {249--267},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_15},
  doi          = {10.1007/978-3-319-22846-4\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LutasLCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NematiDGDV15,
  author       = {Hamed Nemati and
                  Mads Dam and
                  Roberto Guanciale and
                  Viktor Do and
                  Arash Vahidi},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Trustworthy Memory Isolation of Linux on Embedded Devices},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {125--142},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_8},
  doi          = {10.1007/978-3-319-22846-4\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/NematiDGDV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NymanMA15,
  author       = {Thomas Nyman and
                  Brian McGillion and
                  N. Asokan},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {On Making Emerging Trusted Execution Environments Accessible to Developers},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {58--67},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_4},
  doi          = {10.1007/978-3-319-22846-4\_4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/NymanMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SamarasTLSI15,
  author       = {Christos V. Samaras and
                  Ageliki Tsioliaridou and
                  Christos Liaskos and
                  Dimitris Spiliotopoulos and
                  Sotiris Ioannidis},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Enhancing the Trustworthiness of Service On-Demand Systems via Smart
                  Vote Filtering},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_6},
  doi          = {10.1007/978-3-319-22846-4\_6},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SamarasTLSI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VolkamerRCRB15,
  author       = {Melanie Volkamer and
                  Karen Renaud and
                  Gamze Canova and
                  Benjamin Reinheimer and
                  Kristoffer Braun},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Design and Field Evaluation of PassSec: Raising and Sustaining Web
                  Surfer Risk Awareness},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {104--122},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_7},
  doi          = {10.1007/978-3-319-22846-4\_7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/VolkamerRCRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/YangYQZF15,
  author       = {Bo Yang and
                  Kang Yang and
                  Yu Qin and
                  Zhenfeng Zhang and
                  Dengguo Feng},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {{DAA-TZ:} An Efficient {DAA} Scheme for Mobile Devices Using {ARM}
                  TrustZone},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {209--227},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_13},
  doi          = {10.1007/978-3-319-22846-4\_13},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/YangYQZF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhaoZ15,
  author       = {Shijun Zhao and
                  Qianying Zhang},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {A Unified Security Analysis of Two-Phase Key Exchange Protocols in
                  {TPM} 2.0},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {40--57},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_3},
  doi          = {10.1007/978-3-319-22846-4\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZhaoZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2015,
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4},
  doi          = {10.1007/978-3-319-22846-4},
  isbn         = {978-3-319-22845-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AndriotisTOLTXRP14,
  author       = {Panagiotis Andriotis and
                  Theo Tryfonas and
                  George C. Oikonomou and
                  Shancang Li and
                  Zacharias Tzermias and
                  Konstantinos Xynos and
                  Huw Read and
                  Vassilis Prevelakis},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {On the Development of Automated Forensic Analysis Methods for Mobile
                  Devices},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {212--213},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_17},
  doi          = {10.1007/978-3-319-08593-7\_17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/AndriotisTOLTXRP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AndroulakiK14,
  author       = {Elli Androulaki and
                  Ghassan O. Karame},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Hiding Transaction Amounts and Balances in Bitcoin},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {161--178},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_11},
  doi          = {10.1007/978-3-319-08593-7\_11},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/AndroulakiK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AyedBCH14,
  author       = {Dhouha Ayed and
                  Patrik Bichsel and
                  Jan Camenisch and
                  Jerry den Hartog},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Integration of Data-Minimising Authentication into Authorisation Systems},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {179--187},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_12},
  doi          = {10.1007/978-3-319-08593-7\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/AyedBCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BohliDKL14,
  author       = {Jens{-}Matthias Bohli and
                  Dan Dobre and
                  Ghassan O. Karame and
                  Wenting Li},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {PrivLoc: Preventing Location Tracking in Geofencing Services},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {143--160},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_10},
  doi          = {10.1007/978-3-319-08593-7\_10},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/BohliDKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BuiVL14,
  author       = {Vinh T. Bui and
                  Richard Verhoeven and
                  Johan Lukkien},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Evaluating Trustworthiness through Monitoring: The Foot, the Horse
                  and the Elephant},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {188--205},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_13},
  doi          = {10.1007/978-3-319-08593-7\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BuiVL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ChatziadamAPF14,
  author       = {Panos Chatziadam and
                  Ioannis G. Askoxylakis and
                  Nikolaos E. Petroulakis and
                  Alexandros G. Fragkiadakis},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Early Warning Intrusion Detection System},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {222--223},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_22},
  doi          = {10.1007/978-3-319-08593-7\_22},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ChatziadamAPF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/FallOKY14,
  author       = {Doudou Fall and
                  Takeshi Okuda and
                  Youki Kadobayashi and
                  Suguru Yamaguchi},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical
                  Architecture},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_9},
  doi          = {10.1007/978-3-319-08593-7\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/FallOKY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/GoethemCNDJ14,
  author       = {Tom van Goethem and
                  Ping Chen and
                  Nick Nikiforakis and
                  Lieven Desmet and
                  Wouter Joosen},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Large-Scale Security Analysis of the Web: Challenges and Findings},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {110--126},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_8},
  doi          = {10.1007/978-3-319-08593-7\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/GoethemCNDJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HeJEL14,
  author       = {Ying He and
                  Chris W. Johnson and
                  Maria Evangelopoulou and
                  Zheng{-}Shuai Lin},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Diagraming Approach to Structure the Security Lessons: Evaluation
                  Using Cognitive Dimensions},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {216--217},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_19},
  doi          = {10.1007/978-3-319-08593-7\_19},
  timestamp    = {Tue, 29 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HeJEL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HenneKS14,
  author       = {Benjamin Henne and
                  Christian Kater and
                  Matthew Smith},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {On Usable Location Privacy for Android with Crowd-Recommendations},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {74--82},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_5},
  doi          = {10.1007/978-3-319-08593-7\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HenneKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/MohammadiBPMWP14,
  author       = {Nazila Gol Mohammadi and
                  Torsten Bandyszak and
                  Sachar Paulus and
                  Per H{\aa}kon Meland and
                  Thorsten Weyer and
                  Klaus Pohl},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Extending Development Methodologies with Trustworthiness-By-Design
                  for Socio-Technical Systems - (Extended Abstract)},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {206--207},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_14},
  doi          = {10.1007/978-3-319-08593-7\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/MohammadiBPMWP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/OhzekiWKTHS14,
  author       = {Kazuo Ohzeki and
                  Yuanyu Wei and
                  Masaaki Kajihara and
                  Masahiro Takatsuka and
                  Yutaka Hirakawa and
                  Toru Sugimoto},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Authentication System Using Encrypted Discrete Biometrics Data},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {210--211},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_16},
  doi          = {10.1007/978-3-319-08593-7\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/OhzekiWKTHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/PetsasOTBP14,
  author       = {Thanasis Petsas and
                  Kazuya Okada and
                  Hajime Tazaki and
                  Gregory Blanc and
                  Pawel Pawlinski},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {A Trusted Knowledge Management System for Multi-layer Threat Analysis},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {214--215},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_18},
  doi          = {10.1007/978-3-319-08593-7\_18},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/PetsasOTBP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SchallerALK14,
  author       = {Andr{\'{e}} Schaller and
                  Tolga Arul and
                  Vincent van der Leest and
                  Stefan Katzenbeisser},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware
                  Using Inherent PUFs},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {83--100},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_6},
  doi          = {10.1007/978-3-319-08593-7\_6},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/SchallerALK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SchusterH14,
  author       = {Dieter Schuster and
                  Robert Hesselbarth},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Evaluation of Bistable Ring PUFs Using Single Layer Neural Networks},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {101--109},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_7},
  doi          = {10.1007/978-3-319-08593-7\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SchusterH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SchwarzGD14,
  author       = {Oliver Schwarz and
                  Christian Gehrmann and
                  Viktor Do},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Affordable Separation on Embedded Platforms - Soft Reboot Enabled
                  Virtualization on a Dual Mode System},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_3},
  doi          = {10.1007/978-3-319-08593-7\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SchwarzGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SinhaJEL14,
  author       = {Arunesh Sinha and
                  Limin Jia and
                  Paul England and
                  Jacob R. Lorch},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Continuous Tamper-Proof Logging Using {TPM} 2.0},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_2},
  doi          = {10.1007/978-3-319-08593-7\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SinhaJEL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/StamatogiannakisGB14,
  author       = {Manolis Stamatogiannakis and
                  Paul Groth and
                  Herbert Bos},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Facilitating Trust on Data through Provenance},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {220--221},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_21},
  doi          = {10.1007/978-3-319-08593-7\_21},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/StamatogiannakisGB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/StroggylosMTPRSIK14,
  author       = {Kostantinos Stroggylos and
                  Dimitris Mitropoulos and
                  Zacharias Tzermias and
                  Panagiotis Papadopoulos and
                  Fotios Rafailidis and
                  Diomidis Spinellis and
                  Sotiris Ioannidis and
                  Panagiotis Katsaros},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {{TRACER:} {A} Platform for Securing Legacy Code},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {218--219},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_20},
  doi          = {10.1007/978-3-319-08593-7\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/StroggylosMTPRSIK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/XiYZF14,
  author       = {Li Xi and
                  Kang Yang and
                  Zhenfeng Zhang and
                  Dengguo Feng},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {DAA-Related APIs in {TPM} 2.0 Revisited},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_1},
  doi          = {10.1007/978-3-319-08593-7\_1},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/XiYZF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhouSJ14,
  author       = {Yajin Zhou and
                  Kapil Singh and
                  Xuxian Jiang},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Owner-Centric Protection of Unstructured Data on Smartphones},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_4},
  doi          = {10.1007/978-3-319-08593-7\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZhouSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Zic14,
  author       = {John Zic},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Challenges in Establishing Trustworthy Collaborations for Timely Responses
                  to Emergency Animal Disease Incidents - (Extended Abstract)},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {208--209},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_15},
  doi          = {10.1007/978-3-319-08593-7\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Zic14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2014,
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7},
  doi          = {10.1007/978-3-319-08593-7},
  isbn         = {978-3-319-08592-0},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AndersonCP13,
  author       = {Gabrielle Anderson and
                  Matthew Collinson and
                  David J. Pym},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {232--249},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_18},
  doi          = {10.1007/978-3-642-38908-5\_18},
  timestamp    = {Mon, 11 Sep 2023 15:43:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/AndersonCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BartschVTK13,
  author       = {Steffen Bartsch and
                  Melanie Volkamer and
                  Heike Theuerling and
                  Fatih Karayumak},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Contextualized Web Warnings, and How They Cause Distrust},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {205--222},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_16},
  doi          = {10.1007/978-3-642-38908-5\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BartschVTK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Ben-RomdhaneGD13,
  author       = {Molka Ben{-}Romdhane and
                  Tarik Graba and
                  Jean{-}Luc Danger},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Stochastic Model of a Metastability-Based True Random Number Generator},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {92--105},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_7},
  doi          = {10.1007/978-3-642-38908-5\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Ben-RomdhaneGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BurnettENCRJP13,
  author       = {Chris Burnett and
                  Peter Edwards and
                  Timothy J. Norman and
                  Liang Chen and
                  Yogachandran Rahulamathavan and
                  Mariesha Jaffray and
                  Edoardo Pignotti},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {{TRUMP:} {A} Trusted Mobile Platform for Self-management of Chronic
                  Illness in Rural Areas},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {142--150},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_11},
  doi          = {10.1007/978-3-642-38908-5\_11},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/BurnettENCRJP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BuschHLSTW13,
  author       = {Marc Busch and
                  Christina Hochleitner and
                  Mario Lorenz and
                  Trenton Schulz and
                  Manfred Tscheligi and
                  Eckhart Wittstock},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {All In: Targeting Trustworthiness for Special Needs User Groups in
                  the Internet of Things},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {223--231},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_17},
  doi          = {10.1007/978-3-642-38908-5\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BuschHLSTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ChengD13,
  author       = {Yueqiang Cheng and
                  Xuhua Ding},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Guardian: Hypervisor as Security Foothold for Personal Computers},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_2},
  doi          = {10.1007/978-3-642-38908-5\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/ChengD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/EvripidouT13,
  author       = {Valentinos Evripidou and
                  Francesca Toni},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Quaestio-it.com: From Debates Towards Trustworthy Answers - (Extended
                  Abstract)},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {273--274},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_23},
  doi          = {10.1007/978-3-642-38908-5\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/EvripidouT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/FailyPAF13,
  author       = {Shamal Faily and
                  David Power and
                  Philip Armstrong and
                  Ivan Flechais},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Formal Evaluation of Persona Trustworthiness with {EUSTACE} - (Extended
                  Abstract)},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {267--268},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_20},
  doi          = {10.1007/978-3-642-38908-5\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/FailyPAF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/FengFWQZC13,
  author       = {Wei Feng and
                  Dengguo Feng and
                  Ge Wei and
                  Yu Qin and
                  Qianying Zhang and
                  Dexian Chang},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {{TEEM:} {A} User-Oriented Trusted Mobile Device for Multi-platform
                  Security Applications},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {133--141},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_10},
  doi          = {10.1007/978-3-642-38908-5\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/FengFWQZC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HenniganKBLF13,
  author       = {Eric Hennigan and
                  Christoph Kerschbaumer and
                  Stefan Brunthaler and
                  Per Larsen and
                  Michael Franz},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {First-Class Labels: Using Information Flow to Debug Security Holes},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {151--168},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_12},
  doi          = {10.1007/978-3-642-38908-5\_12},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/HenniganKBLF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HofstedeB13,
  author       = {Nick Hofstede and
                  Nick Van den Bleeken},
  editor       = {John Lyle and
                  Shamal Faily and
                  Marcel Winandy},
  title        = {Using the {W3C} WebCrypto {API} for Document Signing},
  booktitle    = {Proceedings of the Workshop on Web Applications and Secure Hardware
                  (WASH'13), Co-located with the 6th International Conference on Trust
                  and Trustworthy Computing {(TRUST} 2013), London, United Kingdom,
                  June 20, 2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1011},
  pages        = {10--16},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1011/2.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:57 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/HofstedeB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HuangZLW13,
  author       = {Heqing Huang and
                  Sencun Zhu and
                  Peng Liu and
                  Dinghao Wu},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {A Framework for Evaluating Mobile App Repackaging Detection Algorithms},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {169--186},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_13},
  doi          = {10.1007/978-3-642-38908-5\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HuangZLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HuthK13,
  author       = {Michael Huth and
                  Jim Huan{-}Pu Kuo},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Towards Verifiable Trust Management for Software Execution - (Extended
                  Abstract)},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {275--276},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_24},
  doi          = {10.1007/978-3-642-38908-5\_24},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HuthK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Karame13,
  author       = {Ghassan Karame},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Towards Trustworthy Network Measurements},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {83--91},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_6},
  doi          = {10.1007/978-3-642-38908-5\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Karame13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KerschbaumerHLBF13,
  author       = {Christoph Kerschbaumer and
                  Eric Hennigan and
                  Per Larsen and
                  Stefan Brunthaler and
                  Michael Franz},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Towards Precise and Efficient Information Flow Control in Web Browsers},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {187--195},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_14},
  doi          = {10.1007/978-3-642-38908-5\_14},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/KerschbaumerHLBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/King-Lacroix13,
  author       = {Justin King{-}Lacroix},
  editor       = {John Lyle and
                  Shamal Faily and
                  Marcel Winandy},
  title        = {Position Paper: Can the Web Really Use Secure Hardware?},
  booktitle    = {Proceedings of the Workshop on Web Applications and Secure Hardware
                  (WASH'13), Co-located with the 6th International Conference on Trust
                  and Trustworthy Computing {(TRUST} 2013), London, United Kingdom,
                  June 20, 2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1011},
  pages        = {17--22},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1011/3.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/King-Lacroix13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KoshyCSF13,
  author       = {Lyzgeo Merin Koshy and
                  Marc Conrad and
                  Mitul Shukla and
                  Tim French},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Identity Implies Trust in Distributed Systems - {A} Novel Approach
                  - (Extended Abstract)},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {269--270},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_21},
  doi          = {10.1007/978-3-642-38908-5\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KoshyCSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LightC13,
  author       = {Ann Light and
                  Lizzie Coles{-}Kemp},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Granddaughter Beware! An Intergenerational Case Study of Managing
                  Trust Issues in the Use of Facebook},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {196--204},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_15},
  doi          = {10.1007/978-3-642-38908-5\_15},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LightC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/MalheirosPS13,
  author       = {Miguel Malheiros and
                  S{\"{o}}ren Preibusch and
                  Martina Angela Sasse},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance,
                  and Sensitivity on Personal Data Disclosure},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {250--266},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_19},
  doi          = {10.1007/978-3-642-38908-5\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/MalheirosPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/MicallefJBK13,
  author       = {Nicholas Micallef and
                  Mike Just and
                  Lynne Baillie and
                  Hilmi G{\"{u}}nes Kayacik},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Non-intrusive and Transparent Authentication on Smart Phones - (Extended
                  Abstract)},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {271--272},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_22},
  doi          = {10.1007/978-3-642-38908-5\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/MicallefJBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/MontanariHBC13,
  author       = {Mirko Montanari and
                  Jun Ho Huh and
                  Rakesh Bobba and
                  Roy H. Campbell},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Limiting Data Exposure in Monitoring Multi-domain Policy Conformance},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {65--82},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_5},
  doi          = {10.1007/978-3-642-38908-5\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/MontanariHBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NamilukoPS13,
  author       = {Cornelius Namiluko and
                  Andrew J. Paverd and
                  Tulio de Souza},
  editor       = {John Lyle and
                  Shamal Faily and
                  Marcel Winandy},
  title        = {Towards Enhancing Web Application Security Using Trusted Execution},
  booktitle    = {Proceedings of the Workshop on Web Applications and Secure Hardware
                  (WASH'13), Co-located with the 6th International Conference on Trust
                  and Trustworthy Computing {(TRUST} 2013), London, United Kingdom,
                  June 20, 2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1011},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1011/4.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/NamilukoPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NordholzAE13,
  author       = {Jan Nordholz and
                  Ronald Aigner and
                  Paul England},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Improving Trusted Tickets with State-Bound Keys},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {37--46},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_3},
  doi          = {10.1007/978-3-642-38908-5\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/NordholzAE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/PirkerW13,
  author       = {Martin Pirker and
                  Johannes Winter},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Semi-automated Prototyping of a {TPM} v2 Software and Hardware Simulation
                  Platform},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {106--114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_8},
  doi          = {10.1007/978-3-642-38908-5\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/PirkerW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/PotzmaderWHHTC13,
  author       = {Klaus Potzmader and
                  Johannes Winter and
                  Daniel M. Hein and
                  Christian Hanser and
                  Peter Teufl and
                  Liqun Chen},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Group Signatures on Mobile Devices: Practical Experiences},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {47--64},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_4},
  doi          = {10.1007/978-3-642-38908-5\_4},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/PotzmaderWHHTC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SuwiryaLC13,
  author       = {Darmawan Suwirya and
                  Karen Lu and
                  Laurent Castillo},
  editor       = {John Lyle and
                  Shamal Faily and
                  Marcel Winandy},
  title        = {Managing Access to Security Hardware in {PC} Browsers},
  booktitle    = {Proceedings of the Workshop on Web Applications and Secure Hardware
                  (WASH'13), Co-located with the 6th International Conference on Trust
                  and Trustworthy Computing {(TRUST} 2013), London, United Kingdom,
                  June 20, 2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1011},
  pages        = {3--9},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1011/1.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/SuwiryaLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/TamrakarE13,
  author       = {Sandeep Tamrakar and
                  Jan{-}Erik Ekberg},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Tapping and Tripping with {NFC}},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {115--132},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_9},
  doi          = {10.1007/978-3-642-38908-5\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/TamrakarE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ToeglWP13,
  author       = {Ronald Toegl and
                  Johannes Winter and
                  Martin Pirker},
  editor       = {John Lyle and
                  Shamal Faily and
                  Marcel Winandy},
  title        = {Position Paper: {A} Path Towards Ubiquitous Protection of Media},
  booktitle    = {Proceedings of the Workshop on Web Applications and Secure Hardware
                  (WASH'13), Co-located with the 6th International Conference on Trust
                  and Trustworthy Computing {(TRUST} 2013), London, United Kingdom,
                  June 20, 2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1011},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1011/5.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/ToeglWP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/YapT13,
  author       = {Jiun Yi Yap and
                  Allan Tomlinson},
  editor       = {John Lyle and
                  Shamal Faily and
                  Marcel Winandy},
  title        = {Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification},
  booktitle    = {Proceedings of the Workshop on Web Applications and Secure Hardware
                  (WASH'13), Co-located with the 6th International Conference on Trust
                  and Trustworthy Computing {(TRUST} 2013), London, United Kingdom,
                  June 20, 2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1011},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1011/6.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/YapT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhouHLPG13,
  author       = {Zongwei Zhou and
                  Jun Han and
                  Yue{-}Hsun Lin and
                  Adrian Perrig and
                  Virgil D. Gligor},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {{KISS:} "Key It Simple and Secure" Corporate Key Management},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_1},
  doi          = {10.1007/978-3-642-38908-5\_1},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZhouHLPG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2013,
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5},
  doi          = {10.1007/978-3-642-38908-5},
  isbn         = {978-3-642-38907-8},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2013wash,
  editor       = {John Lyle and
                  Shamal Faily and
                  Marcel Winandy},
  title        = {Proceedings of the Workshop on Web Applications and Secure Hardware
                  (WASH'13), Co-located with the 6th International Conference on Trust
                  and Trustworthy Computing {(TRUST} 2013), London, United Kingdom,
                  June 20, 2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1011},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1011},
  urn          = {urn:nbn:de:0074-1011-6},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/2013wash.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/CaiC12,
  author       = {Liang Cai and
                  Hao Chen},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {On the Practicality of Motion Based Keystroke Inference Attack},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {273--290},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_16},
  doi          = {10.1007/978-3-642-30921-2\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/CaiC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ChengD12,
  author       = {Yueqiang Cheng and
                  Xuhua Ding},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Virtualization Based Password Protection against Malware in Untrusted
                  Operating Systems},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_12},
  doi          = {10.1007/978-3-642-30921-2\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/ChengD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/CristofaroT12,
  author       = {Emiliano De Cristofaro and
                  Gene Tsudik},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Experimenting with Fast Private Set Intersection},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_4},
  doi          = {10.1007/978-3-642-30921-2\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/CristofaroT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/DmitrienkoSTW12,
  author       = {Alexandra Dmitrienko and
                  Ahmad{-}Reza Sadeghi and
                  Sandeep Tamrakar and
                  Christian Wachsmann},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {SmartTokens: Delegable Access Control with NFC-Enabled Smartphones},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {219--238},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_13},
  doi          = {10.1007/978-3-642-30921-2\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/DmitrienkoSTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/EkbergAA12,
  author       = {Jan{-}Erik Ekberg and
                  Alexandra Afanasyeva and
                  N. Asokan},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Authenticated Encryption Primitives for Size-Constrained Trusted Computing},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_1},
  doi          = {10.1007/978-3-642-30921-2\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/EkbergAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/GiblerCEC12,
  author       = {Clint Gibler and
                  Jonathan Crussell and
                  Jeremy Erickson and
                  Hao Chen},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android
                  Applications on a Large Scale},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {291--307},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_17},
  doi          = {10.1007/978-3-642-30921-2\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/GiblerCEC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HasanKT12,
  author       = {Zahid Hasan and
                  Alina Krischkowsky and
                  Manfred Tscheligi},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Modelling User-Centered-Trust {(UCT)} in Software Systems: Interplay
                  of Trust, Affect and Acceptance Model},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {92--109},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_6},
  doi          = {10.1007/978-3-642-30921-2\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HasanKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KirlapposSH12,
  author       = {Iacovos Kirlappos and
                  Martina Angela Sasse and
                  Nigel Harvey},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Why Trust Seals Don't Work: {A} Study of User Perceptions and Behavior},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {308--324},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_18},
  doi          = {10.1007/978-3-642-30921-2\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KirlapposSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KocabasPKS12,
  author       = {{\"{U}}nal Ko{\c{c}}abas and
                  Andreas Peter and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Converse PUF-Based Authentication},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {142--158},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_9},
  doi          = {10.1007/978-3-642-30921-2\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KocabasPKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Kumar12,
  author       = {Apurva Kumar},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {A Belief Logic for Analyzing Security of Web Protocols},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {239--254},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_14},
  doi          = {10.1007/978-3-642-30921-2\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Kumar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Murphy12,
  author       = {Julian P. Murphy},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Clockless Physical Unclonable Functions},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {110--121},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_7},
  doi          = {10.1007/978-3-642-30921-2\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Murphy12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NamilukoM12,
  author       = {Cornelius Namiluko and
                  Andrew P. Martin},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Provenance-Based Model for Verifying Trust-Properties},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {255--272},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_15},
  doi          = {10.1007/978-3-642-30921-2\_15},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/NamilukoM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/PirkerWT12,
  author       = {Martin Pirker and
                  Johannes Winter and
                  Ronald Toegl},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Lightweight Distributed Heterogeneous Attested Android Clouds},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {122--141},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_8},
  doi          = {10.1007/978-3-642-30921-2\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/PirkerWT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SangorrinHT12,
  author       = {Daniel Sangorr{\'{\i}}n and
                  Shinya Honda and
                  Hiroaki Takada},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {74--91},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_5},
  doi          = {10.1007/978-3-642-30921-2\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SangorrinHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SchiffmanVJ12,
  author       = {Joshua Schiffman and
                  Hayawardh Vijayakumar and
                  Trent Jaeger},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Verifying System Integrity by Proxy},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {179--200},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_11},
  doi          = {10.1007/978-3-642-30921-2\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SchiffmanVJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SmartR12,
  author       = {Matt Smart and
                  Eike Ritter},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_2},
  doi          = {10.1007/978-3-642-30921-2\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SmartR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VasudevanOZNM12,
  author       = {Amit Vasudevan and
                  Emmanuel Owusu and
                  Zongwei Zhou and
                  James Newsome and
                  Jonathan M. McCune},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Trustworthy Execution on Mobile Devices: What Security Properties
                  Can My Mobile Platform Give Me?},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_10},
  doi          = {10.1007/978-3-642-30921-2\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/VasudevanOZNM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VasudevanPQGP12,
  author       = {Amit Vasudevan and
                  Bryan Parno and
                  Ning Qu and
                  Virgil D. Gligor and
                  Adrian Perrig},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Lockdown: Towards a Safe and Practical Architecture for Security Applications
                  on Commodity Platforms},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {34--54},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_3},
  doi          = {10.1007/978-3-642-30921-2\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/VasudevanPQGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhengSXZ12,
  author       = {Saijing Zheng and
                  Pan Shi and
                  Heng Xu and
                  Cheng Zhang},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Launching the New Profile on Facebook: Understanding the Triggers
                  and Outcomes of Users' Privacy Concerns},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {325--339},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_19},
  doi          = {10.1007/978-3-642-30921-2\_19},
  timestamp    = {Sat, 18 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZhengSXZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2012,
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2},
  doi          = {10.1007/978-3-642-30921-2},
  isbn         = {978-3-642-30920-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AllodiCC11,
  author       = {Luca Allodi and
                  Luca Chiodi and
                  Marco Cremonini},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Modifying Trust Dynamics through Cooperation and Defection in Evolving
                  Social Networks},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {131--145},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_10},
  doi          = {10.1007/978-3-642-21599-5\_10},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/AllodiCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BaugherL11,
  author       = {Mark Baugher and
                  Victor Lortz},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Home-Network Threats and Access Controls},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {217--230},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_16},
  doi          = {10.1007/978-3-642-21599-5\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BaugherL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BenteDHHVHW11,
  author       = {Ingo Bente and
                  Gabi Dreo and
                  Bastian Hellmann and
                  Stephan Heuser and
                  J{\"{o}}rg Vieweg and
                  Josef von Helden and
                  Johannes Westhuis},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Towards Permission-Based Attestation for the Android Platform - (Short
                  Paper)},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {108--115},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_8},
  doi          = {10.1007/978-3-642-21599-5\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BenteDHHVHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/CapkunDT11,
  author       = {Srdjan Capkun and
                  Karim M. El Defrawy and
                  Gene Tsudik},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Group Distance Bounding Protocols - (Short Paper)},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {302--312},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_23},
  doi          = {10.1007/978-3-642-21599-5\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/CapkunDT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ChangVWKLSL11,
  author       = {Jian Chang and
                  Krishna K. Venkatasubramanian and
                  Andrew G. West and
                  Sampath Kannan and
                  Boon Thau Loo and
                  Oleg Sokolsky and
                  Insup Lee},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {{AS-TRUST:} {A} Trust Quantification Scheme for Autonomous Systems
                  in {BGP}},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {262--276},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_20},
  doi          = {10.1007/978-3-642-21599-5\_20},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/ChangVWKLSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/CristofaroLT11,
  author       = {Emiliano De Cristofaro and
                  Yanbin Lu and
                  Gene Tsudik},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_18},
  doi          = {10.1007/978-3-642-21599-5\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/CristofaroLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/DietrichW11,
  author       = {Kurt Dietrich and
                  Johannes Winter},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded
                  Systems},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_2},
  doi          = {10.1007/978-3-642-21599-5\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/DietrichW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/FinkSMC11,
  author       = {Russell A. Fink and
                  Alan T. Sherman and
                  Alexander O. Mitchell and
                  David C. Challener},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Catching the Cuckoo: Verifying {TPM} Proximity Using a Quote Timing
                  Side-Channel - (Short Paper)},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {294--301},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_22},
  doi          = {10.1007/978-3-642-21599-5\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/FinkSMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/FrazierDWP11,
  author       = {Gregory Frazier and
                  Quang Duong and
                  Michael P. Wellman and
                  Edward Petersen},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Incentivizing Responsible Networking via Introduction-Based Routing},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {277--293},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_21},
  doi          = {10.1007/978-3-642-21599-5\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/FrazierDWP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HuangGDS11,
  author       = {Ruirui C. Huang and
                  David Grawrock and
                  David C. Doughty and
                  G. Edward Suh},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Systematic Security Assessment at an Early Processor Design Stage},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {154--171},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_12},
  doi          = {10.1007/978-3-642-21599-5\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HuangGDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KoeberlLRVW11,
  author       = {Patrick Koeberl and
                  Jiangtao Li and
                  Anand Rajan and
                  Claire Vishik and
                  Wei Wu},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {A Practical Device Authentication Scheme Using {SRAM} PUFs},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_5},
  doi          = {10.1007/978-3-642-21599-5\_5},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/KoeberlLRVW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KostiainenAE11,
  author       = {Kari Kostiainen and
                  N. Asokan and
                  Jan{-}Erik Ekberg},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Practical Property-Based Attestation on Mobile Devices},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {78--92},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_6},
  doi          = {10.1007/978-3-642-21599-5\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/KostiainenAE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KrzywieckiK11,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Coalition Resistant Anonymous Broadcast Encryption Scheme Based on
                  {PUF}},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {48--62},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_4},
  doi          = {10.1007/978-3-642-21599-5\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KrzywieckiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LeMayG11,
  author       = {Michael LeMay and
                  Carl A. Gunter},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Enforcing Executing-Implies-Verified with the Integrity-Aware Processor},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {202--216},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_15},
  doi          = {10.1007/978-3-642-21599-5\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LeMayG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LuoD11,
  author       = {Tongbo Luo and
                  Wenliang Du},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Contego: Capability-Based Access Control for Web Browsers - (Short
                  Paper)},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {231--238},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_17},
  doi          = {10.1007/978-3-642-21599-5\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LuoD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/MalheirosJSS11,
  author       = {Miguel Malheiros and
                  Charlene Jennett and
                  William Seager and
                  Martina Angela Sasse},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Trusting to Learn: Trust and Privacy Issues in Serious Games},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {116--130},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_9},
  doi          = {10.1007/978-3-642-21599-5\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/MalheirosJSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/MerliSSS11,
  author       = {Dominik Merli and
                  Dieter Schuster and
                  Frederic Stumpf and
                  Georg Sigl},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Side-Channel Analysis of PUFs and Fuzzy Extractors},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_3},
  doi          = {10.1007/978-3-642-21599-5\_3},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/MerliSSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NamilukoHM11,
  author       = {Cornelius Namiluko and
                  Jun Ho Huh and
                  Andrew P. Martin},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Verifying Trustworthiness of Virtual Appliances in Collaborative Environments},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_1},
  doi          = {10.1007/978-3-642-21599-5\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/NamilukoHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/PrabhuAGYSKS11,
  author       = {Pravin Prabhu and
                  Ameen Akel and
                  Laura M. Grupp and
                  Wing{-}Kei S. Yu and
                  G. Edward Suh and
                  Edwin Kan and
                  Steven Swanson},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Extracting Device Fingerprints from Flash Memory by Exploiting Physical
                  Variations},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {188--201},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_14},
  doi          = {10.1007/978-3-642-21599-5\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/PrabhuAGYSKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/RiesHMV11,
  author       = {Sebastian Ries and
                  Sheikh Mahbub Habib and
                  Max M{\"{u}}hlh{\"{a}}user and
                  Vijay Varadharajan},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {CertainLogic: {A} Logic for Modeling Trust and Uncertainty - (Short
                  Paper)},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {254--261},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_19},
  doi          = {10.1007/978-3-642-21599-5\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/RiesHMV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/WangNC11,
  author       = {Yang Wang and
                  Gregory Norcie and
                  Lorrie Faith Cranor},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Who Is Concerned about What? {A} Study of American, Chinese and Indian
                  Users' Privacy Concerns on Social Network Sites - (Short Paper)},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {146--153},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_11},
  doi          = {10.1007/978-3-642-21599-5\_11},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/WangNC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/WilliamsB11,
  author       = {Peter Williams and
                  Rick Boivie},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {{CPU} Support for Secure Executables},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {172--187},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_13},
  doi          = {10.1007/978-3-642-21599-5\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/WilliamsB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhouZJF11,
  author       = {Yajin Zhou and
                  Xinwen Zhang and
                  Xuxian Jiang and
                  Vincent W. Freeh},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Taming Information-Stealing Smartphone Applications (on Android)},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {93--107},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_7},
  doi          = {10.1007/978-3-642-21599-5\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZhouZJF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2011,
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5},
  doi          = {10.1007/978-3-642-21599-5},
  isbn         = {978-3-642-21598-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AblesR10,
  author       = {King Ables and
                  Mark Dermot Ryan},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Escrowed Data and the Digital Envelope},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {246--256},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_16},
  doi          = {10.1007/978-3-642-13869-0\_16},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/AblesR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AlsouriDK10,
  author       = {Sami Alsouri and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Stefan Katzenbeisser},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Group-Based Attestation: Enhancing Privacy and Management in Remote
                  Attestation},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_5},
  doi          = {10.1007/978-3-642-13869-0\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/AlsouriDK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BratusLS10,
  author       = {Sergey Bratus and
                  Michael E. Locasto and
                  Brian Schulte},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {SegSlice: Towards a New Class of Secure Programming Primitives for
                  Trustworthy Platforms},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_15},
  doi          = {10.1007/978-3-642-13869-0\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BratusLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BratusLS10a,
  author       = {Sergey Bratus and
                  Ashlyn Lembree and
                  Anna Shubina},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Software on the Witness Stand: What Should It Take for Us to Trust
                  It?},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {396--416},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_29},
  doi          = {10.1007/978-3-642-13869-0\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BratusLS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BrickellL10,
  author       = {Ernie Brickell and
                  Jiangtao Li},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {A Pairing-Based {DAA} Scheme Further Reducing {TPM} Resources},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_12},
  doi          = {10.1007/978-3-642-13869-0\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BrickellL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BuschSKS10,
  author       = {Heike Busch and
                  Miroslava Sot{\'{a}}kov{\'{a}} and
                  Stefan Katzenbeisser and
                  Radu Sion},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {The {PUF} Promise},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {290--297},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_21},
  doi          = {10.1007/978-3-642-13869-0\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BuschSKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/CesenaLRSV10,
  author       = {Emanuele Cesena and
                  Hans L{\"{o}}hr and
                  Gianluca Ramunno and
                  Ahmad{-}Reza Sadeghi and
                  Davide Vernizzi},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Anonymous Authentication with {TLS} and {DAA}},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_4},
  doi          = {10.1007/978-3-642-13869-0\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/CesenaLRSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Chen10,
  author       = {Liqun Chen},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {A {DAA} Scheme Using Batch Proof and Verification},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_11},
  doi          = {10.1007/978-3-642-13869-0\_11},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Chen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/GrossklagsRCC10,
  author       = {Jens Grossklags and
                  Svetlana Radosavac and
                  Alvaro A. C{\'{a}}rdenas and
                  John Chuang},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Nudge: Intermediaries' Role in Interdependent Network Security},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {323--336},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_24},
  doi          = {10.1007/978-3-642-13869-0\_24},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/GrossklagsRCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HerzbergS10,
  author       = {Amir Herzberg and
                  Haya Schulmann},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Robust Combiners for Software Hardening},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {282--289},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_20},
  doi          = {10.1007/978-3-642-13869-0\_20},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HerzbergS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HuS10,
  author       = {Yin Hu and
                  Berk Sunar},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {An Improved Memory Integrity Protection Scheme},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {273--281},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_19},
  doi          = {10.1007/978-3-642-13869-0\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HuS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KostiainenDESA10,
  author       = {Kari Kostiainen and
                  Alexandra Dmitrienko and
                  Jan{-}Erik Ekberg and
                  Ahmad{-}Reza Sadeghi and
                  N. Asokan},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Key Attestation from Trusted Execution Environments},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {30--46},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_3},
  doi          = {10.1007/978-3-642-13869-0\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/KostiainenDESA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KrautheimPS10,
  author       = {F. John Krautheim and
                  Dhananjay S. Phatak and
                  Alan T. Sherman},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Introducing the Trusted Virtual Environment Module: {A} New Mechanism
                  for Rooting Trust in Cloud Computing},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {211--227},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_14},
  doi          = {10.1007/978-3-642-13869-0\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KrautheimPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KrzywieckiK10,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Lagrangian E-Voting: Verifiability on Demand and Strong Privacy},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {109--123},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_8},
  doi          = {10.1007/978-3-642-13869-0\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KrzywieckiK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LiMP10,
  author       = {Yanlin Li and
                  Jonathan M. McCune and
                  Adrian Perrig},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {{SBAP:} Software-Based Attestation for Peripherals},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_2},
  doi          = {10.1007/978-3-642-13869-0\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LiMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LiR10,
  author       = {Jiangtao Li and
                  Anand Rajan},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {An Anonymous Attestation Scheme with Optional Traceability},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {196--210},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_13},
  doi          = {10.1007/978-3-642-13869-0\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LiR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Lieberknecht10,
  author       = {Nora Lieberknecht},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Application of Trusted Computing in Automation to Prevent Product
                  Piracy},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {95--108},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_7},
  doi          = {10.1007/978-3-642-13869-0\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Lieberknecht10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LyleM10,
  author       = {John Lyle and
                  Andrew P. Martin},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Engineering Attestable Services},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {257--264},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_17},
  doi          = {10.1007/978-3-642-13869-0\_17},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LyleM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NaumanKZS10,
  author       = {Mohammad Nauman and
                  Sohail Khan and
                  Xinwen Zhang and
                  Jean{-}Pierre Seifert},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation
                  for the Android Platform},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_1},
  doi          = {10.1007/978-3-642-13869-0\_1},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/NaumanKZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/PirkerTG10,
  author       = {Martin Pirker and
                  Ronald Toegl and
                  Michael Gissing},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Dynamic Enforcement of Platform Integrity},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {265--272},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_18},
  doi          = {10.1007/978-3-642-13869-0\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/PirkerTG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/PotzschB10,
  author       = {Stefanie P{\"{o}}tzsch and
                  Rainer B{\"{o}}hme},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {The Role of Soft Information in Trust Building: Evidence from Online
                  Social Lending},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {381--395},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_28},
  doi          = {10.1007/978-3-642-13869-0\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/PotzschB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/RoweWR10,
  author       = {Brent Rowe and
                  Dallas Wood and
                  Douglas S. Reeves},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {How the Public Views Strategies Designed to Reduce the Threat of Botnets},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {337--351},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_25},
  doi          = {10.1007/978-3-642-13869-0\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/RoweWR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Ruhrmair10,
  author       = {Ulrich R{\"{u}}hrmair},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Oblivious Transfer Based on Physical Unclonable Functions},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {430--440},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_31},
  doi          = {10.1007/978-3-642-13869-0\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Ruhrmair10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SadeghiSW10,
  author       = {Ahmad{-}Reza Sadeghi and
                  Thomas Schneider and
                  Marcel Winandy},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Token-Based Cloud Computing},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {417--429},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_30},
  doi          = {10.1007/978-3-642-13869-0\_30},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/SadeghiSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SelhorstSFG10,
  author       = {Marcel Selhorst and
                  Christian St{\"{u}}ble and
                  Florian Feldmann and
                  Utz Gnaida},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Towards a Trusted Mobile Desktop},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {78--94},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_6},
  doi          = {10.1007/978-3-642-13869-0\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SelhorstSFG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ShettySW10,
  author       = {Nikhil Shetty and
                  Galina Schwartz and
                  Jean C. Walrand},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Can Competitive Insurers Improve Network Security?},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_23},
  doi          = {10.1007/978-3-642-13869-0\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ShettySW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/StubleZ10,
  author       = {Christian St{\"{u}}ble and
                  Anoosheh Zaerin},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {\emph{{\(\mathrm{\mu}\)}}TSS - {A} Simplified Trusted Software Stack},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {124--140},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_9},
  doi          = {10.1007/978-3-642-13869-0\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/StubleZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Tan10,
  author       = {Jun{-}E Tan},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {The Leap of Faith from Online to Offline: An Exploratory Study of
                  Couchsurfing.org},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {367--380},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_27},
  doi          = {10.1007/978-3-642-13869-0\_27},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Tan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Thomborson10,
  author       = {Clark D. Thomborson},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Axiomatic and Behavioural Trust},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {352--366},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_26},
  doi          = {10.1007/978-3-642-13869-0\_26},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Thomborson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VasudevanMQDP10,
  author       = {Amit Vasudevan and
                  Jonathan M. McCune and
                  Ning Qu and
                  Leendert van Doorn and
                  Adrian Perrig},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Requirements for an Integrity-Protected Hypervisor on the x86 Hardware
                  Virtualized Architecture},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {141--165},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_10},
  doi          = {10.1007/978-3-642-13869-0\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/VasudevanMQDP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VrakasKTL10,
  author       = {Nikos Vrakas and
                  Christos Kalloniatis and
                  Aggeliki Tsohou and
                  Costas Lambrinoudakis},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Privacy Requirements Engineering for Trustworthy e-Government Services},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {298--307},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_22},
  doi          = {10.1007/978-3-642-13869-0\_22},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/VrakasKTL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2010,
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0},
  doi          = {10.1007/978-3-642-13869-0},
  isbn         = {978-3-642-13868-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BaiardiCSC09,
  author       = {Fabrizio Baiardi and
                  Diego Cilea and
                  Daniele Sgandurra and
                  Francesco Ceccarelli},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Measuring Semantic Integrity for Remote Attestation},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {81--100},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_6},
  doi          = {10.1007/978-3-642-00587-9\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/BaiardiCSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/DietrichW09,
  author       = {Kurt Dietrich and
                  Johannes Winter},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Implementation Aspects of Mobile and Embedded Trusted Computing},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_3},
  doi          = {10.1007/978-3-642-00587-9\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/DietrichW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/DuflotLM09,
  author       = {Lo{\"{\i}}c Duflot and
                  Olivier Levillain and
                  Benjamin Morin},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {{ACPI:} Design Principles and Concerns},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_2},
  doi          = {10.1007/978-3-642-00587-9\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/DuflotLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/EnglandT09,
  author       = {Paul England and
                  Talha Tariq},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Towards a Programmable {TPM}},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_1},
  doi          = {10.1007/978-3-642-00587-9\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/EnglandT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/GalleryNV09,
  author       = {Eimear Gallery and
                  Aarthi Nagarajan and
                  Vijay Varadharajan},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {A Property-Dependent Agent Transfer Protocol},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {240--263},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_15},
  doi          = {10.1007/978-3-642-00587-9\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/GalleryNV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HuhL09,
  author       = {Jun Ho Huh and
                  John Lyle},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Trustworthy Log Reconciliation for Distributed Virtual Organisations},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {169--182},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_11},
  doi          = {10.1007/978-3-642-00587-9\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HuhL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KatzenbeisserKS09,
  author       = {Stefan Katzenbeisser and
                  Klaus Kursawe and
                  Frederic Stumpf},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Revocation of {TPM} Keys},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {120--132},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_8},
  doi          = {10.1007/978-3-642-00587-9\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KatzenbeisserKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LevinDBNCLIB09,
  author       = {Timothy E. Levin and
                  Jeffrey S. Dwoskin and
                  Ganesha Bhaskara and
                  Thuy D. Nguyen and
                  Paul C. Clark and
                  Ruby B. Lee and
                  Cynthia E. Irvine and
                  Terry Benzel},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Securing the Dissemination of Emergency Response Data with an Integrated
                  Hardware-Software Architecture},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_9},
  doi          = {10.1007/978-3-642-00587-9\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LevinDBNCLIB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LohrSSWW09,
  author       = {Hans L{\"{o}}hr and
                  Ahmad{-}Reza Sadeghi and
                  Christian St{\"{u}}ble and
                  Marion Weber and
                  Marcel Winandy},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Modeling Trusted Computing Support in a Protection Profile for High
                  Assurance Security Kernels},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {45--62},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_4},
  doi          = {10.1007/978-3-642-00587-9\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LohrSSWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Lyle09,
  author       = {John Lyle},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Trustable Remote Verification of Web Services},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_10},
  doi          = {10.1007/978-3-642-00587-9\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Lyle09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NaumanAZA09,
  author       = {Mohammad Nauman and
                  Masoom Alam and
                  Xinwen Zhang and
                  Tamleek Ali},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Remote Attestation of Attribute Updates and Information Flows in a
                  {UCON} System},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {63--80},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_5},
  doi          = {10.1007/978-3-642-00587-9\_5},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/NaumanAZA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/PirkerTHD09,
  author       = {Martin Pirker and
                  Ronald Toegl and
                  Daniel M. Hein and
                  Peter Danner},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {A PrivacyCA for Anonymity and Trust},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {101--119},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_7},
  doi          = {10.1007/978-3-642-00587-9\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/PirkerTHD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SchulzS09,
  author       = {Steffen Schulz and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Secure VPNs for Trusted Computing Environments},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {197--216},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_13},
  doi          = {10.1007/978-3-642-00587-9\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SchulzS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SoghoianA09,
  author       = {Christopher Soghoian and
                  Imad Aad},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Merx: Secure and Privacy Preserving Delegated Payments},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {217--239},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_14},
  doi          = {10.1007/978-3-642-00587-9\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SoghoianA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/TurpePSST09,
  author       = {Sven T{\"{u}}rpe and
                  Andreas Poller and
                  Jan Steffan and
                  Jan{-}Peter Stotz and
                  Jan Trukenm{\"{u}}ller},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Attacking the BitLocker Boot Process},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {183--196},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_12},
  doi          = {10.1007/978-3-642-00587-9\_12},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/TurpePSST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2009,
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9},
  doi          = {10.1007/978-3-642-00587-9},
  isbn         = {978-3-642-00586-2},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BottcherKH08,
  author       = {Alexander B{\"{o}}ttcher and
                  Bernhard Kauer and
                  Hermann H{\"{a}}rtig},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Trusted Computing Serving an Anonymity Service},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {143--154},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_11},
  doi          = {10.1007/978-3-540-68979-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BottcherKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BratusDSS08,
  author       = {Sergey Bratus and
                  Nihal D'Cunha and
                  Evan R. Sparks and
                  Sean W. Smith},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {TOCTOU, Traps, and Trusted Computing},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {14--32},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_2},
  doi          = {10.1007/978-3-540-68979-9\_2},
  timestamp    = {Thu, 25 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BratusDSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BrickellCL08,
  author       = {Ernie Brickell and
                  Liqun Chen and
                  Jiangtao Li},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {A New Direct Anonymous Attestation Scheme from Bilinear Maps},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {166--178},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_13},
  doi          = {10.1007/978-3-540-68979-9\_13},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BrickellCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/England08,
  author       = {Paul England},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Practical Techniques for Operating System Attestation},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_1},
  doi          = {10.1007/978-3-540-68979-9\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/England08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/EnglandL08,
  author       = {Paul England and
                  Jork L{\"{o}}ser},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Para-Virtualized {TPM} Sharing},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {119--132},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_9},
  doi          = {10.1007/978-3-540-68979-9\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/EnglandL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HypponenHT08,
  author       = {Konstantin Hypp{\"{o}}nen and
                  Marko Hassinen and
                  Elena Trichina},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Pseudonymous Mobile Identity Architecture Based on Government-Supported
                  {PKI}},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {107--118},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_8},
  doi          = {10.1007/978-3-540-68979-9\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HypponenHT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HypponenHT08a,
  author       = {Konstantin Hypp{\"{o}}nen and
                  Marko Hassinen and
                  Elena Trichina},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Combining Biometric Authentication with Privacy-Enhancing Technologies},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {155--165},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_12},
  doi          = {10.1007/978-3-540-68979-9\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HypponenHT08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LeungCM08,
  author       = {Adrian Leung and
                  Liqun Chen and
                  Chris J. Mitchell},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {On a Possible Privacy Flaw in Direct Anonymous Attestation {(DAA)}},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {179--190},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_14},
  doi          = {10.1007/978-3-540-68979-9\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LeungCM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/MonateS08,
  author       = {Benjamin Monate and
                  Julien Signoles},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Slicing for Security of Code},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {133--142},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_10},
  doi          = {10.1007/978-3-540-68979-9\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/MonateS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SchellekensTP08,
  author       = {Dries Schellekens and
                  Pim Tuyls and
                  Bart Preneel},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Embedded Trusted Computing with Authenticated Non-volatile Memory},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {60--74},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_5},
  doi          = {10.1007/978-3-540-68979-9\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SchellekensTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/StrasserS08,
  author       = {Mario Strasser and
                  Heiko Stamer},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {A Software-Based Trusted Platform Module Emulator},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_3},
  doi          = {10.1007/978-3-540-68979-9\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/StrasserS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Thomborson08,
  author       = {Clark D. Thomborson},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {A Model for New Zealand's Identity Verification Service},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_7},
  doi          = {10.1007/978-3-540-68979-9\_7},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Thomborson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VejdaTPW08,
  author       = {Tobias Vejda and
                  Ronald Toegl and
                  Martin Pirker and
                  Thomas Winkler},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Towards Trust Services for Language-Based Virtual Machines for Grid
                  Computing},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {48--59},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_4},
  doi          = {10.1007/978-3-540-68979-9\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/VejdaTPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/WeigoldKHHBB08,
  author       = {Thomas Weigold and
                  Thorsten Kramp and
                  Reto Hermann and
                  Frank H{\"{o}}ring and
                  Peter Buhler and
                  Michael Baentsch},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {The Zurich Trusted Information Channel - An Efficient Defence Against
                  Man-in-the-Middle and Malicious Software Attacks},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {75--91},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_6},
  doi          = {10.1007/978-3-540-68979-9\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/WeigoldKHHBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2008,
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9},
  doi          = {10.1007/978-3-540-68979-9},
  isbn         = {978-3-540-68978-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics