default search action
TRUST 2012: Vienna, Austria
- Stefan Katzenbeisser, Edgar R. Weippl, L. Jean Camp, Melanie Volkamer, Mike K. Reiter, Xinwen Zhang:
Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7344, Springer 2012, ISBN 978-3-642-30920-5
Technical Strand
- Jan-Erik Ekberg, Alexandra Afanasyeva, N. Asokan:
Authenticated Encryption Primitives for Size-Constrained Trusted Computing. 1-18 - Matt Smart, Eike Ritter:
Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing. 19-33 - Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian Perrig:
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms. 34-54 - Emiliano De Cristofaro, Gene Tsudik:
Experimenting with Fast Private Set Intersection. 55-73 - Daniel Sangorrín, Shinya Honda, Hiroaki Takada:
Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing. 74-91 - Zahid Hasan, Alina Krischkowsky, Manfred Tscheligi:
Modelling User-Centered-Trust (UCT) in Software Systems: Interplay of Trust, Affect and Acceptance Model. 92-109 - Julian P. Murphy:
Clockless Physical Unclonable Functions. 110-121 - Martin Pirker, Johannes Winter, Ronald Toegl:
Lightweight Distributed Heterogeneous Attested Android Clouds. 122-141 - Ünal Koçabas, Andreas Peter, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Converse PUF-Based Authentication. 142-158 - Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, Jonathan M. McCune:
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? 159-178 - Joshua Schiffman, Hayawardh Vijayakumar, Trent Jaeger:
Verifying System Integrity by Proxy. 179-200 - Yueqiang Cheng, Xuhua Ding:
Virtualization Based Password Protection against Malware in Untrusted Operating Systems. 201-218 - Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann:
SmartTokens: Delegable Access Control with NFC-Enabled Smartphones. 219-238 - Apurva Kumar:
A Belief Logic for Analyzing Security of Web Protocols. 239-254 - Cornelius Namiluko, Andrew P. Martin:
Provenance-Based Model for Verifying Trust-Properties. 255-272
Socio-economic Strand
- Liang Cai, Hao Chen:
On the Practicality of Motion Based Keystroke Inference Attack. 273-290 - Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen:
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale. 291-307 - Iacovos Kirlappos, Martina Angela Sasse, Nigel Harvey:
Why Trust Seals Don't Work: A Study of User Perceptions and Behavior. 308-324 - Saijing Zheng, Pan Shi, Heng Xu, Cheng Zhang:
Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns. 325-339
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.