


default search action
TRUST 2012: Vienna, Austria
- Stefan Katzenbeisser, Edgar R. Weippl

, L. Jean Camp, Melanie Volkamer, Mike K. Reiter, Xinwen Zhang:
Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7344, Springer 2012, ISBN 978-3-642-30920-5
Technical Strand
- Jan-Erik Ekberg, Alexandra Afanasyeva, N. Asokan

:
Authenticated Encryption Primitives for Size-Constrained Trusted Computing. 1-18 - Matt Smart, Eike Ritter:

Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing. 19-33 - Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian Perrig:

Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms. 34-54 - Emiliano De Cristofaro, Gene Tsudik:

Experimenting with Fast Private Set Intersection. 55-73 - Daniel Sangorrín, Shinya Honda, Hiroaki Takada:

Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing. 74-91 - Zahid Hasan

, Alina Krischkowsky
, Manfred Tscheligi
:
Modelling User-Centered-Trust (UCT) in Software Systems: Interplay of Trust, Affect and Acceptance Model. 92-109 - Julian P. Murphy:

Clockless Physical Unclonable Functions. 110-121 - Martin Pirker

, Johannes Winter, Ronald Toegl:
Lightweight Distributed Heterogeneous Attested Android Clouds. 122-141 - Ünal Koçabas, Andreas Peter, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:

Converse PUF-Based Authentication. 142-158 - Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, Jonathan M. McCune:

Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? 159-178 - Joshua Schiffman, Hayawardh Vijayakumar, Trent Jaeger:

Verifying System Integrity by Proxy. 179-200 - Yueqiang Cheng, Xuhua Ding

:
Virtualization Based Password Protection against Malware in Untrusted Operating Systems. 201-218 - Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann:

SmartTokens: Delegable Access Control with NFC-Enabled Smartphones. 219-238 - Apurva Kumar:

A Belief Logic for Analyzing Security of Web Protocols. 239-254 - Cornelius Namiluko, Andrew P. Martin

:
Provenance-Based Model for Verifying Trust-Properties. 255-272
Socio-economic Strand
- Liang Cai, Hao Chen

:
On the Practicality of Motion Based Keystroke Inference Attack. 273-290 - Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen

:
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale. 291-307 - Iacovos Kirlappos, Martina Angela Sasse, Nigel Harvey:

Why Trust Seals Don't Work: A Study of User Perceptions and Behavior. 308-324 - Saijing Zheng, Pan Shi, Heng Xu, Cheng Zhang:

Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns. 325-339

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














