Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 190 matches
- 2016
- Michael Till Beck, Stephan Krenn, Franz-Stefan Preiss, Kai Samelin:
Practical Signing-Right Revocation. TRUST 2016: 21-39 - Jan Camenisch, Manu Drijvers, Anja Lehmann:
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited. TRUST 2016: 1-20 - Thomas Hupperich, Katharina Krombholz, Thorsten Holz:
Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness. TRUST 2016: 40-59 - Linus Karlsson, Martin Hell:
Enabling Key Migration Between Non-compatible TPM Versions. TRUST 2016: 101-118 - Matthias Neugschwandtner, Collin Mulliner, William K. Robertson, Engin Kirda:
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices. TRUST 2016: 60-81 - Paul D. Rowe:
Bundling Evidence for Layered Attestation. TRUST 2016: 119-139 - Alexander Spenke, Ralph Breithaupt, Rainer Plaga:
An Arbiter PUF Secured by Remote Random Reconfigurations of an FPGA. TRUST 2016: 140-158 - Paolo Zicari, Roberto Interdonato, Diego Perna, Andrea Tagarelli, Sergio Greco:
Controversy in Trust Networks. TRUST 2016: 82-100 - Michael Franz, Panos Papadimitratos:
Trust and Trustworthy Computing - 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings. Lecture Notes in Computer Science 9824, Springer 2016, ISBN 978-3-319-45571-6 [contents] - 2015
- Frederik Armknecht, Ghassan O. Karame, Avikarsha Mandal, Franck Youssef, Erik Zenner:
Ripple: Overview and Outlook. TRUST 2015: 163-180 - Sourav Bhattacharya, Otto Huhta, N. Asokan:
LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling. TRUST 2015: 143-162 - Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann:
MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography. TRUST 2015: 268-282 - Liqun Chen, Rainer Urian:
DAA-A: Direct Anonymous Attestation with Attributes. TRUST 2015: 228-245 - Adrian Colesa, Sándor Lukács, Vlad Topan, Radu Ciocas, Adrian Pop:
Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications. TRUST 2015: 300-309 - David Förster, Hans Löhr, Jan Zibuschka, Frank Kargl:
REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks. TRUST 2015: 193-208 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Why Attackers Win: On the Learnability of XOR Arbiter PUFs. TRUST 2015: 22-39 - Michalis Kanakakis, Shenja van der Graaf, Costas Kalogiros, Wim Vanobberghen:
Computing Trust Levels Based on User's Personality and Observed System Trustworthiness. TRUST 2015: 71-87 - Ghassan O. Karame, Wenting Li:
Secure Erasure and Code Update in Legacy Sensors. TRUST 2015: 283-299 - Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz, Maria Zhdanova:
Time to Rethink: Trust Brokerage Using Trusted Execution Environments. TRUST 2015: 181-190 - Florian Kohnhäuser, André Schaller, Stefan Katzenbeisser:
PUF-Based Software Protection for Low-End Embedded Devices. TRUST 2015: 3-21 - Andrei Lutas, Sándor Lukács, Adrian Colesa, Dan Lutas:
Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection. TRUST 2015: 249-267 - Hamed Nemati, Mads Dam, Roberto Guanciale, Viktor Do, Arash Vahidi:
Trustworthy Memory Isolation of Linux on Embedded Devices. TRUST 2015: 125-142 - Thomas Nyman, Brian McGillion, N. Asokan:
On Making Emerging Trusted Execution Environments Accessible to Developers. TRUST 2015: 58-67 - Christos V. Samaras, Ageliki Tsioliaridou, Christos Liaskos, Dimitris Spiliotopoulos, Sotiris Ioannidis:
Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering. TRUST 2015: 88-103 - Melanie Volkamer, Karen Renaud, Gamze Canova, Benjamin Reinheimer, Kristoffer Braun:
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness. TRUST 2015: 104-122 - Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone. TRUST 2015: 209-227 - Shijun Zhao, Qianying Zhang:
A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0. TRUST 2015: 40-57 - Mauro Conti, Matthias Schunter, Ioannis G. Askoxylakis:
Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings. Lecture Notes in Computer Science 9229, Springer 2015, ISBN 978-3-319-22845-7 [contents] - 2014
- Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Shancang Li, Zacharias Tzermias, Konstantinos Xynos, Huw Read, Vassilis Prevelakis:
On the Development of Automated Forensic Analysis Methods for Mobile Devices. TRUST 2014: 212-213 - Elli Androulaki, Ghassan O. Karame:
Hiding Transaction Amounts and Balances in Bitcoin. TRUST 2014: 161-178
skipping 160 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 09:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint