Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:conf/trust:"
@inproceedings{DBLP:conf/trust/BeckKPS16, author = {Michael Till Beck and Stephan Krenn and Franz{-}Stefan Preiss and Kai Samelin}, editor = {Michael Franz and Panos Papadimitratos}, title = {Practical Signing-Right Revocation}, booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST} 2016, Vienna, Austria, August 29-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9824}, pages = {21--39}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45572-3\_2}, doi = {10.1007/978-3-319-45572-3\_2}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/BeckKPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/CamenischDL16, author = {Jan Camenisch and Manu Drijvers and Anja Lehmann}, editor = {Michael Franz and Panos Papadimitratos}, title = {Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited}, booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST} 2016, Vienna, Austria, August 29-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9824}, pages = {1--20}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45572-3\_1}, doi = {10.1007/978-3-319-45572-3\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/CamenischDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HupperichKH16, author = {Thomas Hupperich and Katharina Krombholz and Thorsten Holz}, editor = {Michael Franz and Panos Papadimitratos}, title = {Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness}, booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST} 2016, Vienna, Austria, August 29-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9824}, pages = {40--59}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45572-3\_3}, doi = {10.1007/978-3-319-45572-3\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HupperichKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KarlssonH16, author = {Linus Karlsson and Martin Hell}, editor = {Michael Franz and Panos Papadimitratos}, title = {Enabling Key Migration Between Non-compatible {TPM} Versions}, booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST} 2016, Vienna, Austria, August 29-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9824}, pages = {101--118}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45572-3\_6}, doi = {10.1007/978-3-319-45572-3\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/KarlssonH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Neugschwandtner16, author = {Matthias Neugschwandtner and Collin Mulliner and William K. Robertson and Engin Kirda}, editor = {Michael Franz and Panos Papadimitratos}, title = {Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices}, booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST} 2016, Vienna, Austria, August 29-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9824}, pages = {60--81}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45572-3\_4}, doi = {10.1007/978-3-319-45572-3\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Neugschwandtner16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Rowe16, author = {Paul D. Rowe}, editor = {Michael Franz and Panos Papadimitratos}, title = {Bundling Evidence for Layered Attestation}, booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST} 2016, Vienna, Austria, August 29-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9824}, pages = {119--139}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45572-3\_7}, doi = {10.1007/978-3-319-45572-3\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Rowe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SpenkeBP16, author = {Alexander Spenke and Ralph Breithaupt and Rainer Plaga}, editor = {Michael Franz and Panos Papadimitratos}, title = {An Arbiter {PUF} Secured by Remote Random Reconfigurations of an {FPGA}}, booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST} 2016, Vienna, Austria, August 29-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9824}, pages = {140--158}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45572-3\_8}, doi = {10.1007/978-3-319-45572-3\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SpenkeBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZicariIPTG16, author = {Paolo Zicari and Roberto Interdonato and Diego Perna and Andrea Tagarelli and Sergio Greco}, editor = {Michael Franz and Panos Papadimitratos}, title = {Controversy in Trust Networks}, booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST} 2016, Vienna, Austria, August 29-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9824}, pages = {82--100}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45572-3\_5}, doi = {10.1007/978-3-319-45572-3\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZicariIPTG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2016, editor = {Michael Franz and Panos Papadimitratos}, title = {Trust and Trustworthy Computing - 9th International Conference, {TRUST} 2016, Vienna, Austria, August 29-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9824}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45572-3}, doi = {10.1007/978-3-319-45572-3}, isbn = {978-3-319-45571-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ArmknechtKMYZ15, author = {Frederik Armknecht and Ghassan O. Karame and Avikarsha Mandal and Franck Youssef and Erik Zenner}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Ripple: Overview and Outlook}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {163--180}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_10}, doi = {10.1007/978-3-319-22846-4\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/ArmknechtKMYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BhattacharyaHA15, author = {Sourav Bhattacharya and Otto Huhta and N. Asokan}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {143--162}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_9}, doi = {10.1007/978-3-319-22846-4\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/BhattacharyaHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ChenRNSS15, author = {Qingqing Chen and Ulrich R{\"{u}}hrmair and Spoorthy Narayana and Uzair Sharif and Ulf Schlichtmann}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {{MWA} Skew {SRAM} Based {SIMPL} Systems for Public-Key Physical Cryptography}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {268--282}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_16}, doi = {10.1007/978-3-319-22846-4\_16}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ChenRNSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ChenU15, author = {Liqun Chen and Rainer Urian}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {{DAA-A:} Direct Anonymous Attestation with Attributes}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {228--245}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_14}, doi = {10.1007/978-3-319-22846-4\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ChenU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ColesaLTCP15, author = {Adrian Colesa and S{\'{a}}ndor Luk{\'{a}}cs and Vlad Topan and Radu Ciocas and Adrian Pop}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {300--309}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_18}, doi = {10.1007/978-3-319-22846-4\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ColesaLTCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ForsterLZK15, author = {David F{\"{o}}rster and Hans L{\"{o}}hr and Jan Zibuschka and Frank Kargl}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {{REWIRE} - Revocation Without Resolution: {A} Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {193--208}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_12}, doi = {10.1007/978-3-319-22846-4\_12}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ForsterLZK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/GanjiTS15, author = {Fatemeh Ganji and Shahin Tajik and Jean{-}Pierre Seifert}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Why Attackers Win: On the Learnability of {XOR} Arbiter PUFs}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {22--39}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_2}, doi = {10.1007/978-3-319-22846-4\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/GanjiTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KanakakisGKV15, author = {Michalis Kanakakis and Shenja van der Graaf and Costas Kalogiros and Wim Vanobberghen}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Computing Trust Levels Based on User's Personality and Observed System Trustworthiness}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {71--87}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_5}, doi = {10.1007/978-3-319-22846-4\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KanakakisGKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KarameL15, author = {Ghassan O. Karame and Wenting Li}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Secure Erasure and Code Update in Legacy Sensors}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {283--299}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_17}, doi = {10.1007/978-3-319-22846-4\_17}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/KarameL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KoeberlPRS0Z15, author = {Patrick Koeberl and Vinay Phegade and Anand Rajan and Thomas Schneider and Steffen Schulz and Maria Zhdanova}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Time to Rethink: Trust Brokerage Using Trusted Execution Environments}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {181--190}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_11}, doi = {10.1007/978-3-319-22846-4\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KoeberlPRS0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KohnhauserS015, author = {Florian Kohnh{\"{a}}user and Andr{\'{e}} Schaller and Stefan Katzenbeisser}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {PUF-Based Software Protection for Low-End Embedded Devices}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {3--21}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_1}, doi = {10.1007/978-3-319-22846-4\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KohnhauserS015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LutasLCL15, author = {Andrei Lutas and S{\'{a}}ndor Luk{\'{a}}cs and Adrian Colesa and Dan Lutas}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {249--267}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_15}, doi = {10.1007/978-3-319-22846-4\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LutasLCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/NematiDGDV15, author = {Hamed Nemati and Mads Dam and Roberto Guanciale and Viktor Do and Arash Vahidi}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Trustworthy Memory Isolation of Linux on Embedded Devices}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {125--142}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_8}, doi = {10.1007/978-3-319-22846-4\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/NematiDGDV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/NymanMA15, author = {Thomas Nyman and Brian McGillion and N. Asokan}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {On Making Emerging Trusted Execution Environments Accessible to Developers}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {58--67}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_4}, doi = {10.1007/978-3-319-22846-4\_4}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/NymanMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SamarasTLSI15, author = {Christos V. Samaras and Ageliki Tsioliaridou and Christos Liaskos and Dimitris Spiliotopoulos and Sotiris Ioannidis}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {88--103}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_6}, doi = {10.1007/978-3-319-22846-4\_6}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SamarasTLSI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VolkamerRCRB15, author = {Melanie Volkamer and Karen Renaud and Gamze Canova and Benjamin Reinheimer and Kristoffer Braun}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {104--122}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_7}, doi = {10.1007/978-3-319-22846-4\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/VolkamerRCRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/YangYQZF15, author = {Bo Yang and Kang Yang and Yu Qin and Zhenfeng Zhang and Dengguo Feng}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {{DAA-TZ:} An Efficient {DAA} Scheme for Mobile Devices Using {ARM} TrustZone}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {209--227}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_13}, doi = {10.1007/978-3-319-22846-4\_13}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/YangYQZF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZhaoZ15, author = {Shijun Zhao and Qianying Zhang}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {A Unified Security Analysis of Two-Phase Key Exchange Protocols in {TPM} 2.0}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {40--57}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_3}, doi = {10.1007/978-3-319-22846-4\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZhaoZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2015, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4}, doi = {10.1007/978-3-319-22846-4}, isbn = {978-3-319-22845-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/AndriotisTOLTXRP14, author = {Panagiotis Andriotis and Theo Tryfonas and George C. Oikonomou and Shancang Li and Zacharias Tzermias and Konstantinos Xynos and Huw Read and Vassilis Prevelakis}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {On the Development of Automated Forensic Analysis Methods for Mobile Devices}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {212--213}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_17}, doi = {10.1007/978-3-319-08593-7\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/AndriotisTOLTXRP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/AndroulakiK14, author = {Elli Androulaki and Ghassan O. Karame}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Hiding Transaction Amounts and Balances in Bitcoin}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {161--178}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_11}, doi = {10.1007/978-3-319-08593-7\_11}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/AndroulakiK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/AyedBCH14, author = {Dhouha Ayed and Patrik Bichsel and Jan Camenisch and Jerry den Hartog}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Integration of Data-Minimising Authentication into Authorisation Systems}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {179--187}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_12}, doi = {10.1007/978-3-319-08593-7\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/AyedBCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BohliDKL14, author = {Jens{-}Matthias Bohli and Dan Dobre and Ghassan O. Karame and Wenting Li}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {PrivLoc: Preventing Location Tracking in Geofencing Services}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {143--160}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_10}, doi = {10.1007/978-3-319-08593-7\_10}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/BohliDKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BuiVL14, author = {Vinh T. Bui and Richard Verhoeven and Johan Lukkien}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {188--205}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_13}, doi = {10.1007/978-3-319-08593-7\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BuiVL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ChatziadamAPF14, author = {Panos Chatziadam and Ioannis G. Askoxylakis and Nikolaos E. Petroulakis and Alexandros G. Fragkiadakis}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Early Warning Intrusion Detection System}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {222--223}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_22}, doi = {10.1007/978-3-319-08593-7\_22}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ChatziadamAPF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/FallOKY14, author = {Doudou Fall and Takeshi Okuda and Youki Kadobayashi and Suguru Yamaguchi}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {127--142}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_9}, doi = {10.1007/978-3-319-08593-7\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/FallOKY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/GoethemCNDJ14, author = {Tom van Goethem and Ping Chen and Nick Nikiforakis and Lieven Desmet and Wouter Joosen}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Large-Scale Security Analysis of the Web: Challenges and Findings}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {110--126}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_8}, doi = {10.1007/978-3-319-08593-7\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/GoethemCNDJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HeJEL14, author = {Ying He and Chris W. Johnson and Maria Evangelopoulou and Zheng{-}Shuai Lin}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive Dimensions}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {216--217}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_19}, doi = {10.1007/978-3-319-08593-7\_19}, timestamp = {Tue, 29 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HeJEL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HenneKS14, author = {Benjamin Henne and Christian Kater and Matthew Smith}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {On Usable Location Privacy for Android with Crowd-Recommendations}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {74--82}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_5}, doi = {10.1007/978-3-319-08593-7\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HenneKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MohammadiBPMWP14, author = {Nazila Gol Mohammadi and Torsten Bandyszak and Sachar Paulus and Per H{\aa}kon Meland and Thorsten Weyer and Klaus Pohl}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {206--207}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_14}, doi = {10.1007/978-3-319-08593-7\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/MohammadiBPMWP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/OhzekiWKTHS14, author = {Kazuo Ohzeki and Yuanyu Wei and Masaaki Kajihara and Masahiro Takatsuka and Yutaka Hirakawa and Toru Sugimoto}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Authentication System Using Encrypted Discrete Biometrics Data}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {210--211}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_16}, doi = {10.1007/978-3-319-08593-7\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/OhzekiWKTHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/PetsasOTBP14, author = {Thanasis Petsas and Kazuya Okada and Hajime Tazaki and Gregory Blanc and Pawel Pawlinski}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {A Trusted Knowledge Management System for Multi-layer Threat Analysis}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {214--215}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_18}, doi = {10.1007/978-3-319-08593-7\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/PetsasOTBP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SchallerALK14, author = {Andr{\'{e}} Schaller and Tolga Arul and Vincent van der Leest and Stefan Katzenbeisser}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {83--100}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_6}, doi = {10.1007/978-3-319-08593-7\_6}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/SchallerALK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SchusterH14, author = {Dieter Schuster and Robert Hesselbarth}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Evaluation of Bistable Ring PUFs Using Single Layer Neural Networks}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {101--109}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_7}, doi = {10.1007/978-3-319-08593-7\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SchusterH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SchwarzGD14, author = {Oliver Schwarz and Christian Gehrmann and Viktor Do}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {37--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_3}, doi = {10.1007/978-3-319-08593-7\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SchwarzGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SinhaJEL14, author = {Arunesh Sinha and Limin Jia and Paul England and Jacob R. Lorch}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Continuous Tamper-Proof Logging Using {TPM} 2.0}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {19--36}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_2}, doi = {10.1007/978-3-319-08593-7\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SinhaJEL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/StamatogiannakisGB14, author = {Manolis Stamatogiannakis and Paul Groth and Herbert Bos}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Facilitating Trust on Data through Provenance}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {220--221}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_21}, doi = {10.1007/978-3-319-08593-7\_21}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/StamatogiannakisGB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/StroggylosMTPRSIK14, author = {Kostantinos Stroggylos and Dimitris Mitropoulos and Zacharias Tzermias and Panagiotis Papadopoulos and Fotios Rafailidis and Diomidis Spinellis and Sotiris Ioannidis and Panagiotis Katsaros}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {{TRACER:} {A} Platform for Securing Legacy Code}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {218--219}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_20}, doi = {10.1007/978-3-319-08593-7\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/StroggylosMTPRSIK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/XiYZF14, author = {Li Xi and Kang Yang and Zhenfeng Zhang and Dengguo Feng}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {DAA-Related APIs in {TPM} 2.0 Revisited}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {1--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_1}, doi = {10.1007/978-3-319-08593-7\_1}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/XiYZF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZhouSJ14, author = {Yajin Zhou and Kapil Singh and Xuxian Jiang}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Owner-Centric Protection of Unstructured Data on Smartphones}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {55--73}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_4}, doi = {10.1007/978-3-319-08593-7\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZhouSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Zic14, author = {John Zic}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {208--209}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_15}, doi = {10.1007/978-3-319-08593-7\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Zic14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2014, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7}, doi = {10.1007/978-3-319-08593-7}, isbn = {978-3-319-08592-0}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/AndersonCP13, author = {Gabrielle Anderson and Matthew Collinson and David J. Pym}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {232--249}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_18}, doi = {10.1007/978-3-642-38908-5\_18}, timestamp = {Mon, 11 Sep 2023 15:43:49 +0200}, biburl = {https://dblp.org/rec/conf/trust/AndersonCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BartschVTK13, author = {Steffen Bartsch and Melanie Volkamer and Heike Theuerling and Fatih Karayumak}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Contextualized Web Warnings, and How They Cause Distrust}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {205--222}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_16}, doi = {10.1007/978-3-642-38908-5\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BartschVTK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Ben-RomdhaneGD13, author = {Molka Ben{-}Romdhane and Tarik Graba and Jean{-}Luc Danger}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Stochastic Model of a Metastability-Based True Random Number Generator}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {92--105}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_7}, doi = {10.1007/978-3-642-38908-5\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Ben-RomdhaneGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BurnettENCRJP13, author = {Chris Burnett and Peter Edwards and Timothy J. Norman and Liang Chen and Yogachandran Rahulamathavan and Mariesha Jaffray and Edoardo Pignotti}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {{TRUMP:} {A} Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {142--150}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_11}, doi = {10.1007/978-3-642-38908-5\_11}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/BurnettENCRJP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BuschHLSTW13, author = {Marc Busch and Christina Hochleitner and Mario Lorenz and Trenton Schulz and Manfred Tscheligi and Eckhart Wittstock}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {223--231}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_17}, doi = {10.1007/978-3-642-38908-5\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BuschHLSTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ChengD13, author = {Yueqiang Cheng and Xuhua Ding}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Guardian: Hypervisor as Security Foothold for Personal Computers}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {19--36}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_2}, doi = {10.1007/978-3-642-38908-5\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/ChengD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/EvripidouT13, author = {Valentinos Evripidou and Francesca Toni}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Quaestio-it.com: From Debates Towards Trustworthy Answers - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {273--274}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_23}, doi = {10.1007/978-3-642-38908-5\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/EvripidouT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/FailyPAF13, author = {Shamal Faily and David Power and Philip Armstrong and Ivan Flechais}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Formal Evaluation of Persona Trustworthiness with {EUSTACE} - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {267--268}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_20}, doi = {10.1007/978-3-642-38908-5\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/FailyPAF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/FengFWQZC13, author = {Wei Feng and Dengguo Feng and Ge Wei and Yu Qin and Qianying Zhang and Dexian Chang}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {{TEEM:} {A} User-Oriented Trusted Mobile Device for Multi-platform Security Applications}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {133--141}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_10}, doi = {10.1007/978-3-642-38908-5\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/FengFWQZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HenniganKBLF13, author = {Eric Hennigan and Christoph Kerschbaumer and Stefan Brunthaler and Per Larsen and Michael Franz}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {First-Class Labels: Using Information Flow to Debug Security Holes}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {151--168}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_12}, doi = {10.1007/978-3-642-38908-5\_12}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/HenniganKBLF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HofstedeB13, author = {Nick Hofstede and Nick Van den Bleeken}, editor = {John Lyle and Shamal Faily and Marcel Winandy}, title = {Using the {W3C} WebCrypto {API} for Document Signing}, booktitle = {Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing {(TRUST} 2013), London, United Kingdom, June 20, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1011}, pages = {10--16}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1011/2.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:57 +0100}, biburl = {https://dblp.org/rec/conf/trust/HofstedeB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HuangZLW13, author = {Heqing Huang and Sencun Zhu and Peng Liu and Dinghao Wu}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {A Framework for Evaluating Mobile App Repackaging Detection Algorithms}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {169--186}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_13}, doi = {10.1007/978-3-642-38908-5\_13}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HuangZLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HuthK13, author = {Michael Huth and Jim Huan{-}Pu Kuo}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Towards Verifiable Trust Management for Software Execution - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {275--276}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_24}, doi = {10.1007/978-3-642-38908-5\_24}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HuthK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Karame13, author = {Ghassan Karame}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Towards Trustworthy Network Measurements}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {83--91}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_6}, doi = {10.1007/978-3-642-38908-5\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Karame13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KerschbaumerHLBF13, author = {Christoph Kerschbaumer and Eric Hennigan and Per Larsen and Stefan Brunthaler and Michael Franz}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Towards Precise and Efficient Information Flow Control in Web Browsers}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {187--195}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_14}, doi = {10.1007/978-3-642-38908-5\_14}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/KerschbaumerHLBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/King-Lacroix13, author = {Justin King{-}Lacroix}, editor = {John Lyle and Shamal Faily and Marcel Winandy}, title = {Position Paper: Can the Web Really Use Secure Hardware?}, booktitle = {Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing {(TRUST} 2013), London, United Kingdom, June 20, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1011}, pages = {17--22}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1011/3.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/King-Lacroix13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KoshyCSF13, author = {Lyzgeo Merin Koshy and Marc Conrad and Mitul Shukla and Tim French}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Identity Implies Trust in Distributed Systems - {A} Novel Approach - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {269--270}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_21}, doi = {10.1007/978-3-642-38908-5\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KoshyCSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LightC13, author = {Ann Light and Lizzie Coles{-}Kemp}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {196--204}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_15}, doi = {10.1007/978-3-642-38908-5\_15}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LightC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MalheirosPS13, author = {Miguel Malheiros and S{\"{o}}ren Preibusch and Martina Angela Sasse}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {250--266}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_19}, doi = {10.1007/978-3-642-38908-5\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/MalheirosPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MicallefJBK13, author = {Nicholas Micallef and Mike Just and Lynne Baillie and Hilmi G{\"{u}}nes Kayacik}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {271--272}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_22}, doi = {10.1007/978-3-642-38908-5\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/MicallefJBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MontanariHBC13, author = {Mirko Montanari and Jun Ho Huh and Rakesh Bobba and Roy H. Campbell}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Limiting Data Exposure in Monitoring Multi-domain Policy Conformance}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {65--82}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_5}, doi = {10.1007/978-3-642-38908-5\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/MontanariHBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/NamilukoPS13, author = {Cornelius Namiluko and Andrew J. Paverd and Tulio de Souza}, editor = {John Lyle and Shamal Faily and Marcel Winandy}, title = {Towards Enhancing Web Application Security Using Trusted Execution}, booktitle = {Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing {(TRUST} 2013), London, United Kingdom, June 20, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1011}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1011/4.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/NamilukoPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/NordholzAE13, author = {Jan Nordholz and Ronald Aigner and Paul England}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Improving Trusted Tickets with State-Bound Keys}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {37--46}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_3}, doi = {10.1007/978-3-642-38908-5\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/NordholzAE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/PirkerW13, author = {Martin Pirker and Johannes Winter}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Semi-automated Prototyping of a {TPM} v2 Software and Hardware Simulation Platform}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {106--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_8}, doi = {10.1007/978-3-642-38908-5\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/PirkerW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/PotzmaderWHHTC13, author = {Klaus Potzmader and Johannes Winter and Daniel M. Hein and Christian Hanser and Peter Teufl and Liqun Chen}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Group Signatures on Mobile Devices: Practical Experiences}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {47--64}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_4}, doi = {10.1007/978-3-642-38908-5\_4}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/PotzmaderWHHTC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SuwiryaLC13, author = {Darmawan Suwirya and Karen Lu and Laurent Castillo}, editor = {John Lyle and Shamal Faily and Marcel Winandy}, title = {Managing Access to Security Hardware in {PC} Browsers}, booktitle = {Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing {(TRUST} 2013), London, United Kingdom, June 20, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1011}, pages = {3--9}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1011/1.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/SuwiryaLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/TamrakarE13, author = {Sandeep Tamrakar and Jan{-}Erik Ekberg}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Tapping and Tripping with {NFC}}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {115--132}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_9}, doi = {10.1007/978-3-642-38908-5\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/TamrakarE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ToeglWP13, author = {Ronald Toegl and Johannes Winter and Martin Pirker}, editor = {John Lyle and Shamal Faily and Marcel Winandy}, title = {Position Paper: {A} Path Towards Ubiquitous Protection of Media}, booktitle = {Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing {(TRUST} 2013), London, United Kingdom, June 20, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1011}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1011/5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/ToeglWP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/YapT13, author = {Jiun Yi Yap and Allan Tomlinson}, editor = {John Lyle and Shamal Faily and Marcel Winandy}, title = {Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification}, booktitle = {Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing {(TRUST} 2013), London, United Kingdom, June 20, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1011}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1011/6.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/YapT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZhouHLPG13, author = {Zongwei Zhou and Jun Han and Yue{-}Hsun Lin and Adrian Perrig and Virgil D. Gligor}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {{KISS:} "Key It Simple and Secure" Corporate Key Management}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {1--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_1}, doi = {10.1007/978-3-642-38908-5\_1}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZhouHLPG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2013, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5}, doi = {10.1007/978-3-642-38908-5}, isbn = {978-3-642-38907-8}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2013wash, editor = {John Lyle and Shamal Faily and Marcel Winandy}, title = {Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing {(TRUST} 2013), London, United Kingdom, June 20, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1011}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1011}, urn = {urn:nbn:de:0074-1011-6}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/2013wash.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/CaiC12, author = {Liang Cai and Hao Chen}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {On the Practicality of Motion Based Keystroke Inference Attack}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {273--290}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_16}, doi = {10.1007/978-3-642-30921-2\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/CaiC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ChengD12, author = {Yueqiang Cheng and Xuhua Ding}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Virtualization Based Password Protection against Malware in Untrusted Operating Systems}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {201--218}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_12}, doi = {10.1007/978-3-642-30921-2\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/ChengD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/CristofaroT12, author = {Emiliano De Cristofaro and Gene Tsudik}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Experimenting with Fast Private Set Intersection}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {55--73}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_4}, doi = {10.1007/978-3-642-30921-2\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/CristofaroT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/DmitrienkoSTW12, author = {Alexandra Dmitrienko and Ahmad{-}Reza Sadeghi and Sandeep Tamrakar and Christian Wachsmann}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {SmartTokens: Delegable Access Control with NFC-Enabled Smartphones}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {219--238}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_13}, doi = {10.1007/978-3-642-30921-2\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/DmitrienkoSTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/EkbergAA12, author = {Jan{-}Erik Ekberg and Alexandra Afanasyeva and N. Asokan}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Authenticated Encryption Primitives for Size-Constrained Trusted Computing}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {1--18}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_1}, doi = {10.1007/978-3-642-30921-2\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/EkbergAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/GiblerCEC12, author = {Clint Gibler and Jonathan Crussell and Jeremy Erickson and Hao Chen}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {291--307}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_17}, doi = {10.1007/978-3-642-30921-2\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/GiblerCEC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HasanKT12, author = {Zahid Hasan and Alina Krischkowsky and Manfred Tscheligi}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Modelling User-Centered-Trust {(UCT)} in Software Systems: Interplay of Trust, Affect and Acceptance Model}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {92--109}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_6}, doi = {10.1007/978-3-642-30921-2\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HasanKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KirlapposSH12, author = {Iacovos Kirlappos and Martina Angela Sasse and Nigel Harvey}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Why Trust Seals Don't Work: {A} Study of User Perceptions and Behavior}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {308--324}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_18}, doi = {10.1007/978-3-642-30921-2\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KirlapposSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KocabasPKS12, author = {{\"{U}}nal Ko{\c{c}}abas and Andreas Peter and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Converse PUF-Based Authentication}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {142--158}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_9}, doi = {10.1007/978-3-642-30921-2\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KocabasPKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Kumar12, author = {Apurva Kumar}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {A Belief Logic for Analyzing Security of Web Protocols}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {239--254}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_14}, doi = {10.1007/978-3-642-30921-2\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Kumar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Murphy12, author = {Julian P. Murphy}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Clockless Physical Unclonable Functions}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {110--121}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_7}, doi = {10.1007/978-3-642-30921-2\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Murphy12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/NamilukoM12, author = {Cornelius Namiluko and Andrew P. Martin}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Provenance-Based Model for Verifying Trust-Properties}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {255--272}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_15}, doi = {10.1007/978-3-642-30921-2\_15}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/NamilukoM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/PirkerWT12, author = {Martin Pirker and Johannes Winter and Ronald Toegl}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Lightweight Distributed Heterogeneous Attested Android Clouds}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {122--141}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_8}, doi = {10.1007/978-3-642-30921-2\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/PirkerWT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SangorrinHT12, author = {Daniel Sangorr{\'{\i}}n and Shinya Honda and Hiroaki Takada}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {74--91}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_5}, doi = {10.1007/978-3-642-30921-2\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SangorrinHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SchiffmanVJ12, author = {Joshua Schiffman and Hayawardh Vijayakumar and Trent Jaeger}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Verifying System Integrity by Proxy}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {179--200}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_11}, doi = {10.1007/978-3-642-30921-2\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SchiffmanVJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SmartR12, author = {Matt Smart and Eike Ritter}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {19--33}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_2}, doi = {10.1007/978-3-642-30921-2\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SmartR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VasudevanOZNM12, author = {Amit Vasudevan and Emmanuel Owusu and Zongwei Zhou and James Newsome and Jonathan M. McCune}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {159--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_10}, doi = {10.1007/978-3-642-30921-2\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/VasudevanOZNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VasudevanPQGP12, author = {Amit Vasudevan and Bryan Parno and Ning Qu and Virgil D. Gligor and Adrian Perrig}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {34--54}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_3}, doi = {10.1007/978-3-642-30921-2\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/VasudevanPQGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZhengSXZ12, author = {Saijing Zheng and Pan Shi and Heng Xu and Cheng Zhang}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {325--339}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_19}, doi = {10.1007/978-3-642-30921-2\_19}, timestamp = {Sat, 18 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZhengSXZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2012, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2}, doi = {10.1007/978-3-642-30921-2}, isbn = {978-3-642-30920-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/AllodiCC11, author = {Luca Allodi and Luca Chiodi and Marco Cremonini}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Modifying Trust Dynamics through Cooperation and Defection in Evolving Social Networks}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {131--145}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_10}, doi = {10.1007/978-3-642-21599-5\_10}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/AllodiCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BaugherL11, author = {Mark Baugher and Victor Lortz}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Home-Network Threats and Access Controls}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {217--230}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_16}, doi = {10.1007/978-3-642-21599-5\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BaugherL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BenteDHHVHW11, author = {Ingo Bente and Gabi Dreo and Bastian Hellmann and Stephan Heuser and J{\"{o}}rg Vieweg and Josef von Helden and Johannes Westhuis}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Towards Permission-Based Attestation for the Android Platform - (Short Paper)}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {108--115}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_8}, doi = {10.1007/978-3-642-21599-5\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BenteDHHVHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/CapkunDT11, author = {Srdjan Capkun and Karim M. El Defrawy and Gene Tsudik}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Group Distance Bounding Protocols - (Short Paper)}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {302--312}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_23}, doi = {10.1007/978-3-642-21599-5\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/CapkunDT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ChangVWKLSL11, author = {Jian Chang and Krishna K. Venkatasubramanian and Andrew G. West and Sampath Kannan and Boon Thau Loo and Oleg Sokolsky and Insup Lee}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {{AS-TRUST:} {A} Trust Quantification Scheme for Autonomous Systems in {BGP}}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {262--276}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_20}, doi = {10.1007/978-3-642-21599-5\_20}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/ChangVWKLSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/CristofaroLT11, author = {Emiliano De Cristofaro and Yanbin Lu and Gene Tsudik}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {239--253}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_18}, doi = {10.1007/978-3-642-21599-5\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/CristofaroLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/DietrichW11, author = {Kurt Dietrich and Johannes Winter}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {16--32}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_2}, doi = {10.1007/978-3-642-21599-5\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/DietrichW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/FinkSMC11, author = {Russell A. Fink and Alan T. Sherman and Alexander O. Mitchell and David C. Challener}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Catching the Cuckoo: Verifying {TPM} Proximity Using a Quote Timing Side-Channel - (Short Paper)}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {294--301}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_22}, doi = {10.1007/978-3-642-21599-5\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/FinkSMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/FrazierDWP11, author = {Gregory Frazier and Quang Duong and Michael P. Wellman and Edward Petersen}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Incentivizing Responsible Networking via Introduction-Based Routing}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {277--293}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_21}, doi = {10.1007/978-3-642-21599-5\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/FrazierDWP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HuangGDS11, author = {Ruirui C. Huang and David Grawrock and David C. Doughty and G. Edward Suh}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Systematic Security Assessment at an Early Processor Design Stage}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {154--171}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_12}, doi = {10.1007/978-3-642-21599-5\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HuangGDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KoeberlLRVW11, author = {Patrick Koeberl and Jiangtao Li and Anand Rajan and Claire Vishik and Wei Wu}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {A Practical Device Authentication Scheme Using {SRAM} PUFs}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {63--77}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_5}, doi = {10.1007/978-3-642-21599-5\_5}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/KoeberlLRVW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KostiainenAE11, author = {Kari Kostiainen and N. Asokan and Jan{-}Erik Ekberg}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Practical Property-Based Attestation on Mobile Devices}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {78--92}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_6}, doi = {10.1007/978-3-642-21599-5\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/KostiainenAE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KrzywieckiK11, author = {Lukasz Krzywiecki and Miroslaw Kutylowski}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Coalition Resistant Anonymous Broadcast Encryption Scheme Based on {PUF}}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {48--62}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_4}, doi = {10.1007/978-3-642-21599-5\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KrzywieckiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LeMayG11, author = {Michael LeMay and Carl A. Gunter}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Enforcing Executing-Implies-Verified with the Integrity-Aware Processor}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {202--216}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_15}, doi = {10.1007/978-3-642-21599-5\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LeMayG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LuoD11, author = {Tongbo Luo and Wenliang Du}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Contego: Capability-Based Access Control for Web Browsers - (Short Paper)}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {231--238}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_17}, doi = {10.1007/978-3-642-21599-5\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LuoD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MalheirosJSS11, author = {Miguel Malheiros and Charlene Jennett and William Seager and Martina Angela Sasse}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Trusting to Learn: Trust and Privacy Issues in Serious Games}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {116--130}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_9}, doi = {10.1007/978-3-642-21599-5\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/MalheirosJSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MerliSSS11, author = {Dominik Merli and Dieter Schuster and Frederic Stumpf and Georg Sigl}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Side-Channel Analysis of PUFs and Fuzzy Extractors}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {33--47}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_3}, doi = {10.1007/978-3-642-21599-5\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/MerliSSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/NamilukoHM11, author = {Cornelius Namiluko and Jun Ho Huh and Andrew P. Martin}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Verifying Trustworthiness of Virtual Appliances in Collaborative Environments}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {1--15}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_1}, doi = {10.1007/978-3-642-21599-5\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/NamilukoHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/PrabhuAGYSKS11, author = {Pravin Prabhu and Ameen Akel and Laura M. Grupp and Wing{-}Kei S. Yu and G. Edward Suh and Edwin Kan and Steven Swanson}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {188--201}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_14}, doi = {10.1007/978-3-642-21599-5\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/PrabhuAGYSKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/RiesHMV11, author = {Sebastian Ries and Sheikh Mahbub Habib and Max M{\"{u}}hlh{\"{a}}user and Vijay Varadharajan}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {CertainLogic: {A} Logic for Modeling Trust and Uncertainty - (Short Paper)}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {254--261}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_19}, doi = {10.1007/978-3-642-21599-5\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/RiesHMV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/WangNC11, author = {Yang Wang and Gregory Norcie and Lorrie Faith Cranor}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Who Is Concerned about What? {A} Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites - (Short Paper)}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {146--153}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_11}, doi = {10.1007/978-3-642-21599-5\_11}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/WangNC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/WilliamsB11, author = {Peter Williams and Rick Boivie}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {{CPU} Support for Secure Executables}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {172--187}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_13}, doi = {10.1007/978-3-642-21599-5\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/WilliamsB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZhouZJF11, author = {Yajin Zhou and Xinwen Zhang and Xuxian Jiang and Vincent W. Freeh}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Taming Information-Stealing Smartphone Applications (on Android)}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {93--107}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_7}, doi = {10.1007/978-3-642-21599-5\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZhouZJF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2011, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5}, doi = {10.1007/978-3-642-21599-5}, isbn = {978-3-642-21598-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/AblesR10, author = {King Ables and Mark Dermot Ryan}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Escrowed Data and the Digital Envelope}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {246--256}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_16}, doi = {10.1007/978-3-642-13869-0\_16}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/AblesR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/AlsouriDK10, author = {Sami Alsouri and {\"{O}}zg{\"{u}}r Dagdelen and Stefan Katzenbeisser}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {63--77}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_5}, doi = {10.1007/978-3-642-13869-0\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/AlsouriDK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BratusLS10, author = {Sergey Bratus and Michael E. Locasto and Brian Schulte}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {228--245}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_15}, doi = {10.1007/978-3-642-13869-0\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BratusLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BratusLS10a, author = {Sergey Bratus and Ashlyn Lembree and Anna Shubina}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Software on the Witness Stand: What Should It Take for Us to Trust It?}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {396--416}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_29}, doi = {10.1007/978-3-642-13869-0\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BratusLS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BrickellL10, author = {Ernie Brickell and Jiangtao Li}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {A Pairing-Based {DAA} Scheme Further Reducing {TPM} Resources}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {181--195}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_12}, doi = {10.1007/978-3-642-13869-0\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BrickellL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BuschSKS10, author = {Heike Busch and Miroslava Sot{\'{a}}kov{\'{a}} and Stefan Katzenbeisser and Radu Sion}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {The {PUF} Promise}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {290--297}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_21}, doi = {10.1007/978-3-642-13869-0\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BuschSKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/CesenaLRSV10, author = {Emanuele Cesena and Hans L{\"{o}}hr and Gianluca Ramunno and Ahmad{-}Reza Sadeghi and Davide Vernizzi}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Anonymous Authentication with {TLS} and {DAA}}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {47--62}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_4}, doi = {10.1007/978-3-642-13869-0\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/CesenaLRSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Chen10, author = {Liqun Chen}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {A {DAA} Scheme Using Batch Proof and Verification}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {166--180}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_11}, doi = {10.1007/978-3-642-13869-0\_11}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Chen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/GrossklagsRCC10, author = {Jens Grossklags and Svetlana Radosavac and Alvaro A. C{\'{a}}rdenas and John Chuang}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Nudge: Intermediaries' Role in Interdependent Network Security}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {323--336}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_24}, doi = {10.1007/978-3-642-13869-0\_24}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/GrossklagsRCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HerzbergS10, author = {Amir Herzberg and Haya Schulmann}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Robust Combiners for Software Hardening}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {282--289}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_20}, doi = {10.1007/978-3-642-13869-0\_20}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HerzbergS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HuS10, author = {Yin Hu and Berk Sunar}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {An Improved Memory Integrity Protection Scheme}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {273--281}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_19}, doi = {10.1007/978-3-642-13869-0\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HuS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KostiainenDESA10, author = {Kari Kostiainen and Alexandra Dmitrienko and Jan{-}Erik Ekberg and Ahmad{-}Reza Sadeghi and N. Asokan}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Key Attestation from Trusted Execution Environments}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {30--46}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_3}, doi = {10.1007/978-3-642-13869-0\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/KostiainenDESA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KrautheimPS10, author = {F. John Krautheim and Dhananjay S. Phatak and Alan T. Sherman}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Introducing the Trusted Virtual Environment Module: {A} New Mechanism for Rooting Trust in Cloud Computing}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {211--227}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_14}, doi = {10.1007/978-3-642-13869-0\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KrautheimPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KrzywieckiK10, author = {Lukasz Krzywiecki and Miroslaw Kutylowski}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Lagrangian E-Voting: Verifiability on Demand and Strong Privacy}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {109--123}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_8}, doi = {10.1007/978-3-642-13869-0\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KrzywieckiK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LiMP10, author = {Yanlin Li and Jonathan M. McCune and Adrian Perrig}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {{SBAP:} Software-Based Attestation for Peripherals}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {16--29}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_2}, doi = {10.1007/978-3-642-13869-0\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LiMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LiR10, author = {Jiangtao Li and Anand Rajan}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {An Anonymous Attestation Scheme with Optional Traceability}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {196--210}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_13}, doi = {10.1007/978-3-642-13869-0\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LiR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Lieberknecht10, author = {Nora Lieberknecht}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Application of Trusted Computing in Automation to Prevent Product Piracy}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {95--108}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_7}, doi = {10.1007/978-3-642-13869-0\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Lieberknecht10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LyleM10, author = {John Lyle and Andrew P. Martin}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Engineering Attestable Services}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {257--264}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_17}, doi = {10.1007/978-3-642-13869-0\_17}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LyleM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/NaumanKZS10, author = {Mohammad Nauman and Sohail Khan and Xinwen Zhang and Jean{-}Pierre Seifert}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {1--15}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_1}, doi = {10.1007/978-3-642-13869-0\_1}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/NaumanKZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/PirkerTG10, author = {Martin Pirker and Ronald Toegl and Michael Gissing}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Dynamic Enforcement of Platform Integrity}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {265--272}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_18}, doi = {10.1007/978-3-642-13869-0\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/PirkerTG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/PotzschB10, author = {Stefanie P{\"{o}}tzsch and Rainer B{\"{o}}hme}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {The Role of Soft Information in Trust Building: Evidence from Online Social Lending}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {381--395}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_28}, doi = {10.1007/978-3-642-13869-0\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/PotzschB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/RoweWR10, author = {Brent Rowe and Dallas Wood and Douglas S. Reeves}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {How the Public Views Strategies Designed to Reduce the Threat of Botnets}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {337--351}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_25}, doi = {10.1007/978-3-642-13869-0\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/RoweWR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Ruhrmair10, author = {Ulrich R{\"{u}}hrmair}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Oblivious Transfer Based on Physical Unclonable Functions}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {430--440}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_31}, doi = {10.1007/978-3-642-13869-0\_31}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Ruhrmair10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SadeghiSW10, author = {Ahmad{-}Reza Sadeghi and Thomas Schneider and Marcel Winandy}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Token-Based Cloud Computing}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {417--429}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_30}, doi = {10.1007/978-3-642-13869-0\_30}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/SadeghiSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SelhorstSFG10, author = {Marcel Selhorst and Christian St{\"{u}}ble and Florian Feldmann and Utz Gnaida}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Towards a Trusted Mobile Desktop}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {78--94}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_6}, doi = {10.1007/978-3-642-13869-0\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SelhorstSFG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ShettySW10, author = {Nikhil Shetty and Galina Schwartz and Jean C. Walrand}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Can Competitive Insurers Improve Network Security?}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {308--322}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_23}, doi = {10.1007/978-3-642-13869-0\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ShettySW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/StubleZ10, author = {Christian St{\"{u}}ble and Anoosheh Zaerin}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {\emph{{\(\mathrm{\mu}\)}}TSS - {A} Simplified Trusted Software Stack}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {124--140}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_9}, doi = {10.1007/978-3-642-13869-0\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/StubleZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Tan10, author = {Jun{-}E Tan}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.org}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {367--380}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_27}, doi = {10.1007/978-3-642-13869-0\_27}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Tan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Thomborson10, author = {Clark D. Thomborson}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Axiomatic and Behavioural Trust}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {352--366}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_26}, doi = {10.1007/978-3-642-13869-0\_26}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Thomborson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VasudevanMQDP10, author = {Amit Vasudevan and Jonathan M. McCune and Ning Qu and Leendert van Doorn and Adrian Perrig}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {141--165}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_10}, doi = {10.1007/978-3-642-13869-0\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/VasudevanMQDP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VrakasKTL10, author = {Nikos Vrakas and Christos Kalloniatis and Aggeliki Tsohou and Costas Lambrinoudakis}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Privacy Requirements Engineering for Trustworthy e-Government Services}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {298--307}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_22}, doi = {10.1007/978-3-642-13869-0\_22}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/VrakasKTL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2010, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0}, doi = {10.1007/978-3-642-13869-0}, isbn = {978-3-642-13868-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BaiardiCSC09, author = {Fabrizio Baiardi and Diego Cilea and Daniele Sgandurra and Francesco Ceccarelli}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Measuring Semantic Integrity for Remote Attestation}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {81--100}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_6}, doi = {10.1007/978-3-642-00587-9\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/BaiardiCSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/DietrichW09, author = {Kurt Dietrich and Johannes Winter}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Implementation Aspects of Mobile and Embedded Trusted Computing}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {29--44}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_3}, doi = {10.1007/978-3-642-00587-9\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/DietrichW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/DuflotLM09, author = {Lo{\"{\i}}c Duflot and Olivier Levillain and Benjamin Morin}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {{ACPI:} Design Principles and Concerns}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {14--28}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_2}, doi = {10.1007/978-3-642-00587-9\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/DuflotLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/EnglandT09, author = {Paul England and Talha Tariq}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Towards a Programmable {TPM}}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {1--13}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_1}, doi = {10.1007/978-3-642-00587-9\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/EnglandT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/GalleryNV09, author = {Eimear Gallery and Aarthi Nagarajan and Vijay Varadharajan}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {A Property-Dependent Agent Transfer Protocol}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {240--263}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_15}, doi = {10.1007/978-3-642-00587-9\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/GalleryNV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HuhL09, author = {Jun Ho Huh and John Lyle}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Trustworthy Log Reconciliation for Distributed Virtual Organisations}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {169--182}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_11}, doi = {10.1007/978-3-642-00587-9\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HuhL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KatzenbeisserKS09, author = {Stefan Katzenbeisser and Klaus Kursawe and Frederic Stumpf}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Revocation of {TPM} Keys}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {120--132}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_8}, doi = {10.1007/978-3-642-00587-9\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KatzenbeisserKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LevinDBNCLIB09, author = {Timothy E. Levin and Jeffrey S. Dwoskin and Ganesha Bhaskara and Thuy D. Nguyen and Paul C. Clark and Ruby B. Lee and Cynthia E. Irvine and Terry Benzel}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {133--152}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_9}, doi = {10.1007/978-3-642-00587-9\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LevinDBNCLIB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LohrSSWW09, author = {Hans L{\"{o}}hr and Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble and Marion Weber and Marcel Winandy}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {45--62}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_4}, doi = {10.1007/978-3-642-00587-9\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LohrSSWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Lyle09, author = {John Lyle}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Trustable Remote Verification of Web Services}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {153--168}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_10}, doi = {10.1007/978-3-642-00587-9\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Lyle09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/NaumanAZA09, author = {Mohammad Nauman and Masoom Alam and Xinwen Zhang and Tamleek Ali}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Remote Attestation of Attribute Updates and Information Flows in a {UCON} System}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {63--80}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_5}, doi = {10.1007/978-3-642-00587-9\_5}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/NaumanAZA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/PirkerTHD09, author = {Martin Pirker and Ronald Toegl and Daniel M. Hein and Peter Danner}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {A PrivacyCA for Anonymity and Trust}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {101--119}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_7}, doi = {10.1007/978-3-642-00587-9\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/PirkerTHD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SchulzS09, author = {Steffen Schulz and Ahmad{-}Reza Sadeghi}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Secure VPNs for Trusted Computing Environments}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {197--216}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_13}, doi = {10.1007/978-3-642-00587-9\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SchulzS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SoghoianA09, author = {Christopher Soghoian and Imad Aad}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Merx: Secure and Privacy Preserving Delegated Payments}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {217--239}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_14}, doi = {10.1007/978-3-642-00587-9\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SoghoianA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/TurpePSST09, author = {Sven T{\"{u}}rpe and Andreas Poller and Jan Steffan and Jan{-}Peter Stotz and Jan Trukenm{\"{u}}ller}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Attacking the BitLocker Boot Process}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {183--196}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_12}, doi = {10.1007/978-3-642-00587-9\_12}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/TurpePSST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2009, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9}, doi = {10.1007/978-3-642-00587-9}, isbn = {978-3-642-00586-2}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BottcherKH08, author = {Alexander B{\"{o}}ttcher and Bernhard Kauer and Hermann H{\"{a}}rtig}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Trusted Computing Serving an Anonymity Service}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {143--154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_11}, doi = {10.1007/978-3-540-68979-9\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/BottcherKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BratusDSS08, author = {Sergey Bratus and Nihal D'Cunha and Evan R. Sparks and Sean W. Smith}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {TOCTOU, Traps, and Trusted Computing}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {14--32}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_2}, doi = {10.1007/978-3-540-68979-9\_2}, timestamp = {Thu, 25 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BratusDSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BrickellCL08, author = {Ernie Brickell and Liqun Chen and Jiangtao Li}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {A New Direct Anonymous Attestation Scheme from Bilinear Maps}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {166--178}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_13}, doi = {10.1007/978-3-540-68979-9\_13}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BrickellCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/England08, author = {Paul England}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Practical Techniques for Operating System Attestation}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {1--13}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_1}, doi = {10.1007/978-3-540-68979-9\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/England08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/EnglandL08, author = {Paul England and Jork L{\"{o}}ser}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Para-Virtualized {TPM} Sharing}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {119--132}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_9}, doi = {10.1007/978-3-540-68979-9\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/EnglandL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HypponenHT08, author = {Konstantin Hypp{\"{o}}nen and Marko Hassinen and Elena Trichina}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Pseudonymous Mobile Identity Architecture Based on Government-Supported {PKI}}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {107--118}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_8}, doi = {10.1007/978-3-540-68979-9\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HypponenHT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HypponenHT08a, author = {Konstantin Hypp{\"{o}}nen and Marko Hassinen and Elena Trichina}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Combining Biometric Authentication with Privacy-Enhancing Technologies}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {155--165}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_12}, doi = {10.1007/978-3-540-68979-9\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HypponenHT08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LeungCM08, author = {Adrian Leung and Liqun Chen and Chris J. Mitchell}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {On a Possible Privacy Flaw in Direct Anonymous Attestation {(DAA)}}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {179--190}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_14}, doi = {10.1007/978-3-540-68979-9\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LeungCM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MonateS08, author = {Benjamin Monate and Julien Signoles}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Slicing for Security of Code}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {133--142}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_10}, doi = {10.1007/978-3-540-68979-9\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/MonateS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SchellekensTP08, author = {Dries Schellekens and Pim Tuyls and Bart Preneel}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Embedded Trusted Computing with Authenticated Non-volatile Memory}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {60--74}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_5}, doi = {10.1007/978-3-540-68979-9\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SchellekensTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/StrasserS08, author = {Mario Strasser and Heiko Stamer}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {A Software-Based Trusted Platform Module Emulator}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {33--47}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_3}, doi = {10.1007/978-3-540-68979-9\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/StrasserS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Thomborson08, author = {Clark D. Thomborson}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {A Model for New Zealand's Identity Verification Service}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {92--106}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_7}, doi = {10.1007/978-3-540-68979-9\_7}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Thomborson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VejdaTPW08, author = {Tobias Vejda and Ronald Toegl and Martin Pirker and Thomas Winkler}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Towards Trust Services for Language-Based Virtual Machines for Grid Computing}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {48--59}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_4}, doi = {10.1007/978-3-540-68979-9\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/VejdaTPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/WeigoldKHHBB08, author = {Thomas Weigold and Thorsten Kramp and Reto Hermann and Frank H{\"{o}}ring and Peter Buhler and Michael Baentsch}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {75--91}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_6}, doi = {10.1007/978-3-540-68979-9\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/WeigoldKHHBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2008, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9}, doi = {10.1007/978-3-540-68979-9}, isbn = {978-3-540-68978-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.