default search action
TRUST 2013: London, UK
- Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp:
Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7904, Springer 2013, ISBN 978-3-642-38907-8
Technical Strand
- Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil D. Gligor:
KISS: "Key It Simple and Secure" Corporate Key Management. 1-18 - Yueqiang Cheng, Xuhua Ding:
Guardian: Hypervisor as Security Foothold for Personal Computers. 19-36 - Jan Nordholz, Ronald Aigner, Paul England:
Improving Trusted Tickets with State-Bound Keys. 37-46 - Klaus Potzmader, Johannes Winter, Daniel M. Hein, Christian Hanser, Peter Teufl, Liqun Chen:
Group Signatures on Mobile Devices: Practical Experiences. 47-64 - Mirko Montanari, Jun Ho Huh, Rakesh Bobba, Roy H. Campbell:
Limiting Data Exposure in Monitoring Multi-domain Policy Conformance. 65-82 - Ghassan Karame:
Towards Trustworthy Network Measurements. 83-91 - Molka Ben-Romdhane, Tarik Graba, Jean-Luc Danger:
Stochastic Model of a Metastability-Based True Random Number Generator. 92-105 - Martin Pirker, Johannes Winter:
Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform. 106-114 - Sandeep Tamrakar, Jan-Erik Ekberg:
Tapping and Tripping with NFC. 115-132 - Wei Feng, Dengguo Feng, Ge Wei, Yu Qin, Qianying Zhang, Dexian Chang:
TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications. 133-141 - Chris Burnett, Peter Edwards, Timothy J. Norman, Liang Chen, Yogachandran Rahulamathavan, Mariesha Jaffray, Edoardo Pignotti:
TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas. 142-150 - Eric Hennigan, Christoph Kerschbaumer, Stefan Brunthaler, Per Larsen, Michael Franz:
First-Class Labels: Using Information Flow to Debug Security Holes. 151-168 - Heqing Huang, Sencun Zhu, Peng Liu, Dinghao Wu:
A Framework for Evaluating Mobile App Repackaging Detection Algorithms. 169-186 - Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz:
Towards Precise and Efficient Information Flow Control in Web Browsers. 187-195
Socio-Economic Strand
- Ann Light, Lizzie Coles-Kemp:
Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook. 196-204 - Steffen Bartsch, Melanie Volkamer, Heike Theuerling, Fatih Karayumak:
Contextualized Web Warnings, and How They Cause Distrust. 205-222 - Marc Busch, Christina Hochleitner, Mario Lorenz, Trenton Schulz, Manfred Tscheligi, Eckhart Wittstock:
All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things. 223-231 - Gabrielle Anderson, Matthew Collinson, David J. Pym:
Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach. 232-249 - Miguel Malheiros, Sören Preibusch, Martina Angela Sasse:
"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure. 250-266
Poster Abstracts
- Shamal Faily, David Power, Philip Armstrong, Ivan Flechais:
Formal Evaluation of Persona Trustworthiness with EUSTACE - (Extended Abstract). 267-268 - Lyzgeo Merin Koshy, Marc Conrad, Mitul Shukla, Tim French:
Identity Implies Trust in Distributed Systems - A Novel Approach - (Extended Abstract). 269-270 - Nicholas Micallef, Mike Just, Lynne Baillie, Hilmi Günes Kayacik:
Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract). 271-272 - Valentinos Evripidou, Francesca Toni:
Quaestio-it.com: From Debates Towards Trustworthy Answers - (Extended Abstract). 273-274 - Michael Huth, Jim Huan-Pu Kuo:
Towards Verifiable Trust Management for Software Execution - (Extended Abstract). 275-276
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.