


default search action
TRUST 2015: Heraklion, Crete, Greece
- Mauro Conti, Matthias Schunter, Ioannis G. Askoxylakis:

Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings. Lecture Notes in Computer Science 9229, Springer 2015, ISBN 978-3-319-22845-7
Hardware-Enhanced Trusted Execution
- Florian Kohnhäuser, André Schaller, Stefan Katzenbeisser:

PUF-Based Software Protection for Low-End Embedded Devices. 3-21 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:

Why Attackers Win: On the Learnability of XOR Arbiter PUFs. 22-39 - Shijun Zhao, Qianying Zhang:

A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0. 40-57 - Thomas Nyman

, Brian McGillion
, N. Asokan
:
On Making Emerging Trusted Execution Environments Accessible to Developers. 58-67
Trust and Users
- Michalis Kanakakis, Shenja van der Graaf

, Costas Kalogiros, Wim Vanobberghen
:
Computing Trust Levels Based on User's Personality and Observed System Trustworthiness. 71-87 - Christos V. Samaras, Ageliki Tsioliaridou, Christos Liaskos

, Dimitris Spiliotopoulos
, Sotiris Ioannidis:
Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering. 88-103 - Melanie Volkamer, Karen Renaud

, Gamze Canova, Benjamin Reinheimer, Kristoffer Braun:
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness. 104-122
Trusted Systems and Services
- Hamed Nemati

, Mads Dam, Roberto Guanciale
, Viktor Do, Arash Vahidi:
Trustworthy Memory Isolation of Linux on Embedded Devices. 125-142 - Sourav Bhattacharya, Otto Huhta, N. Asokan

:
LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling. 143-162 - Frederik Armknecht

, Ghassan O. Karame, Avikarsha Mandal, Franck Youssef, Erik Zenner:
Ripple: Overview and Outlook. 163-180 - Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider

, Steffen Schulz, Maria Zhdanova
:
Time to Rethink: Trust Brokerage Using Trusted Execution Environments. 181-190
Trust and Privacy
- David Förster

, Hans Löhr, Jan Zibuschka, Frank Kargl:
REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks. 193-208 - Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:

DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone. 209-227 - Liqun Chen

, Rainer Urian:
DAA-A: Direct Anonymous Attestation with Attributes. 228-245
Building Blocks for Trust
- Andrei Lutas, Sándor Lukács, Adrian Colesa

, Dan Lutas:
Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection. 249-267 - Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann

:
MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography. 268-282 - Ghassan O. Karame, Wenting Li

:
Secure Erasure and Code Update in Legacy Sensors. 283-299 - Adrian Colesa

, Sándor Lukács, Vlad Topan, Radu Ciocas, Adrian Pop:
Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications. 300-309

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














