default search action
TRUST 2015: Heraklion, Crete, Greece
- Mauro Conti, Matthias Schunter, Ioannis G. Askoxylakis:
Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings. Lecture Notes in Computer Science 9229, Springer 2015, ISBN 978-3-319-22845-7
Hardware-Enhanced Trusted Execution
- Florian Kohnhäuser, André Schaller, Stefan Katzenbeisser:
PUF-Based Software Protection for Low-End Embedded Devices. 3-21 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Why Attackers Win: On the Learnability of XOR Arbiter PUFs. 22-39 - Shijun Zhao, Qianying Zhang:
A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0. 40-57 - Thomas Nyman, Brian McGillion, N. Asokan:
On Making Emerging Trusted Execution Environments Accessible to Developers. 58-67
Trust and Users
- Michalis Kanakakis, Shenja van der Graaf, Costas Kalogiros, Wim Vanobberghen:
Computing Trust Levels Based on User's Personality and Observed System Trustworthiness. 71-87 - Christos V. Samaras, Ageliki Tsioliaridou, Christos Liaskos, Dimitris Spiliotopoulos, Sotiris Ioannidis:
Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering. 88-103 - Melanie Volkamer, Karen Renaud, Gamze Canova, Benjamin Reinheimer, Kristoffer Braun:
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness. 104-122
Trusted Systems and Services
- Hamed Nemati, Mads Dam, Roberto Guanciale, Viktor Do, Arash Vahidi:
Trustworthy Memory Isolation of Linux on Embedded Devices. 125-142 - Sourav Bhattacharya, Otto Huhta, N. Asokan:
LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling. 143-162 - Frederik Armknecht, Ghassan O. Karame, Avikarsha Mandal, Franck Youssef, Erik Zenner:
Ripple: Overview and Outlook. 163-180 - Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz, Maria Zhdanova:
Time to Rethink: Trust Brokerage Using Trusted Execution Environments. 181-190
Trust and Privacy
- David Förster, Hans Löhr, Jan Zibuschka, Frank Kargl:
REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks. 193-208 - Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone. 209-227 - Liqun Chen, Rainer Urian:
DAA-A: Direct Anonymous Attestation with Attributes. 228-245
Building Blocks for Trust
- Andrei Lutas, Sándor Lukács, Adrian Colesa, Dan Lutas:
Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection. 249-267 - Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann:
MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography. 268-282 - Ghassan O. Karame, Wenting Li:
Secure Erasure and Code Update in Legacy Sensors. 283-299 - Adrian Colesa, Sándor Lukács, Vlad Topan, Radu Ciocas, Adrian Pop:
Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications. 300-309
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.