Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/trust/trust2013.bht:"
@inproceedings{DBLP:conf/trust/AndersonCP13, author = {Gabrielle Anderson and Matthew Collinson and David J. Pym}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {232--249}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_18}, doi = {10.1007/978-3-642-38908-5\_18}, timestamp = {Mon, 11 Sep 2023 15:43:49 +0200}, biburl = {https://dblp.org/rec/conf/trust/AndersonCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BartschVTK13, author = {Steffen Bartsch and Melanie Volkamer and Heike Theuerling and Fatih Karayumak}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Contextualized Web Warnings, and How They Cause Distrust}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {205--222}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_16}, doi = {10.1007/978-3-642-38908-5\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BartschVTK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Ben-RomdhaneGD13, author = {Molka Ben{-}Romdhane and Tarik Graba and Jean{-}Luc Danger}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Stochastic Model of a Metastability-Based True Random Number Generator}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {92--105}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_7}, doi = {10.1007/978-3-642-38908-5\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Ben-RomdhaneGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BurnettENCRJP13, author = {Chris Burnett and Peter Edwards and Timothy J. Norman and Liang Chen and Yogachandran Rahulamathavan and Mariesha Jaffray and Edoardo Pignotti}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {{TRUMP:} {A} Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {142--150}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_11}, doi = {10.1007/978-3-642-38908-5\_11}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/BurnettENCRJP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BuschHLSTW13, author = {Marc Busch and Christina Hochleitner and Mario Lorenz and Trenton Schulz and Manfred Tscheligi and Eckhart Wittstock}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {223--231}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_17}, doi = {10.1007/978-3-642-38908-5\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BuschHLSTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ChengD13, author = {Yueqiang Cheng and Xuhua Ding}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Guardian: Hypervisor as Security Foothold for Personal Computers}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {19--36}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_2}, doi = {10.1007/978-3-642-38908-5\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/ChengD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/EvripidouT13, author = {Valentinos Evripidou and Francesca Toni}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Quaestio-it.com: From Debates Towards Trustworthy Answers - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {273--274}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_23}, doi = {10.1007/978-3-642-38908-5\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/EvripidouT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/FailyPAF13, author = {Shamal Faily and David Power and Philip Armstrong and Ivan Flechais}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Formal Evaluation of Persona Trustworthiness with {EUSTACE} - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {267--268}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_20}, doi = {10.1007/978-3-642-38908-5\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/FailyPAF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/FengFWQZC13, author = {Wei Feng and Dengguo Feng and Ge Wei and Yu Qin and Qianying Zhang and Dexian Chang}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {{TEEM:} {A} User-Oriented Trusted Mobile Device for Multi-platform Security Applications}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {133--141}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_10}, doi = {10.1007/978-3-642-38908-5\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/FengFWQZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HenniganKBLF13, author = {Eric Hennigan and Christoph Kerschbaumer and Stefan Brunthaler and Per Larsen and Michael Franz}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {First-Class Labels: Using Information Flow to Debug Security Holes}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {151--168}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_12}, doi = {10.1007/978-3-642-38908-5\_12}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/HenniganKBLF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HuangZLW13, author = {Heqing Huang and Sencun Zhu and Peng Liu and Dinghao Wu}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {A Framework for Evaluating Mobile App Repackaging Detection Algorithms}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {169--186}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_13}, doi = {10.1007/978-3-642-38908-5\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HuangZLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HuthK13, author = {Michael Huth and Jim Huan{-}Pu Kuo}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Towards Verifiable Trust Management for Software Execution - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {275--276}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_24}, doi = {10.1007/978-3-642-38908-5\_24}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HuthK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Karame13, author = {Ghassan Karame}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Towards Trustworthy Network Measurements}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {83--91}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_6}, doi = {10.1007/978-3-642-38908-5\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Karame13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KerschbaumerHLBF13, author = {Christoph Kerschbaumer and Eric Hennigan and Per Larsen and Stefan Brunthaler and Michael Franz}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Towards Precise and Efficient Information Flow Control in Web Browsers}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {187--195}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_14}, doi = {10.1007/978-3-642-38908-5\_14}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/KerschbaumerHLBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KoshyCSF13, author = {Lyzgeo Merin Koshy and Marc Conrad and Mitul Shukla and Tim French}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Identity Implies Trust in Distributed Systems - {A} Novel Approach - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {269--270}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_21}, doi = {10.1007/978-3-642-38908-5\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KoshyCSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LightC13, author = {Ann Light and Lizzie Coles{-}Kemp}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {196--204}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_15}, doi = {10.1007/978-3-642-38908-5\_15}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LightC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MalheirosPS13, author = {Miguel Malheiros and S{\"{o}}ren Preibusch and Martina Angela Sasse}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {250--266}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_19}, doi = {10.1007/978-3-642-38908-5\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/MalheirosPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MicallefJBK13, author = {Nicholas Micallef and Mike Just and Lynne Baillie and Hilmi G{\"{u}}nes Kayacik}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {271--272}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_22}, doi = {10.1007/978-3-642-38908-5\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/MicallefJBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MontanariHBC13, author = {Mirko Montanari and Jun Ho Huh and Rakesh Bobba and Roy H. Campbell}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Limiting Data Exposure in Monitoring Multi-domain Policy Conformance}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {65--82}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_5}, doi = {10.1007/978-3-642-38908-5\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/MontanariHBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/NordholzAE13, author = {Jan Nordholz and Ronald Aigner and Paul England}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Improving Trusted Tickets with State-Bound Keys}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {37--46}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_3}, doi = {10.1007/978-3-642-38908-5\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/NordholzAE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/PirkerW13, author = {Martin Pirker and Johannes Winter}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Semi-automated Prototyping of a {TPM} v2 Software and Hardware Simulation Platform}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {106--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_8}, doi = {10.1007/978-3-642-38908-5\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/PirkerW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/PotzmaderWHHTC13, author = {Klaus Potzmader and Johannes Winter and Daniel M. Hein and Christian Hanser and Peter Teufl and Liqun Chen}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Group Signatures on Mobile Devices: Practical Experiences}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {47--64}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_4}, doi = {10.1007/978-3-642-38908-5\_4}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/PotzmaderWHHTC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/TamrakarE13, author = {Sandeep Tamrakar and Jan{-}Erik Ekberg}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Tapping and Tripping with {NFC}}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {115--132}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_9}, doi = {10.1007/978-3-642-38908-5\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/TamrakarE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZhouHLPG13, author = {Zongwei Zhou and Jun Han and Yue{-}Hsun Lin and Adrian Perrig and Virgil D. Gligor}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {{KISS:} "Key It Simple and Secure" Corporate Key Management}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {1--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_1}, doi = {10.1007/978-3-642-38908-5\_1}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZhouHLPG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2013, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5}, doi = {10.1007/978-3-642-38908-5}, isbn = {978-3-642-38907-8}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.