Search dblp for Publications

export results for "toc:db/conf/trust/trust2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/trust/AblesR10,
  author       = {King Ables and
                  Mark Dermot Ryan},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Escrowed Data and the Digital Envelope},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {246--256},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_16},
  doi          = {10.1007/978-3-642-13869-0\_16},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/AblesR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AlsouriDK10,
  author       = {Sami Alsouri and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Stefan Katzenbeisser},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Group-Based Attestation: Enhancing Privacy and Management in Remote
                  Attestation},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_5},
  doi          = {10.1007/978-3-642-13869-0\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/AlsouriDK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BratusLS10,
  author       = {Sergey Bratus and
                  Michael E. Locasto and
                  Brian Schulte},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {SegSlice: Towards a New Class of Secure Programming Primitives for
                  Trustworthy Platforms},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_15},
  doi          = {10.1007/978-3-642-13869-0\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BratusLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BratusLS10a,
  author       = {Sergey Bratus and
                  Ashlyn Lembree and
                  Anna Shubina},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Software on the Witness Stand: What Should It Take for Us to Trust
                  It?},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {396--416},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_29},
  doi          = {10.1007/978-3-642-13869-0\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BratusLS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BrickellL10,
  author       = {Ernie Brickell and
                  Jiangtao Li},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {A Pairing-Based {DAA} Scheme Further Reducing {TPM} Resources},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_12},
  doi          = {10.1007/978-3-642-13869-0\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BrickellL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BuschSKS10,
  author       = {Heike Busch and
                  Miroslava Sot{\'{a}}kov{\'{a}} and
                  Stefan Katzenbeisser and
                  Radu Sion},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {The {PUF} Promise},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {290--297},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_21},
  doi          = {10.1007/978-3-642-13869-0\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BuschSKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/CesenaLRSV10,
  author       = {Emanuele Cesena and
                  Hans L{\"{o}}hr and
                  Gianluca Ramunno and
                  Ahmad{-}Reza Sadeghi and
                  Davide Vernizzi},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Anonymous Authentication with {TLS} and {DAA}},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_4},
  doi          = {10.1007/978-3-642-13869-0\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/CesenaLRSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Chen10,
  author       = {Liqun Chen},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {A {DAA} Scheme Using Batch Proof and Verification},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_11},
  doi          = {10.1007/978-3-642-13869-0\_11},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Chen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/GrossklagsRCC10,
  author       = {Jens Grossklags and
                  Svetlana Radosavac and
                  Alvaro A. C{\'{a}}rdenas and
                  John Chuang},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Nudge: Intermediaries' Role in Interdependent Network Security},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {323--336},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_24},
  doi          = {10.1007/978-3-642-13869-0\_24},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/GrossklagsRCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HerzbergS10,
  author       = {Amir Herzberg and
                  Haya Schulmann},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Robust Combiners for Software Hardening},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {282--289},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_20},
  doi          = {10.1007/978-3-642-13869-0\_20},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HerzbergS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HuS10,
  author       = {Yin Hu and
                  Berk Sunar},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {An Improved Memory Integrity Protection Scheme},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {273--281},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_19},
  doi          = {10.1007/978-3-642-13869-0\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HuS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KostiainenDESA10,
  author       = {Kari Kostiainen and
                  Alexandra Dmitrienko and
                  Jan{-}Erik Ekberg and
                  Ahmad{-}Reza Sadeghi and
                  N. Asokan},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Key Attestation from Trusted Execution Environments},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {30--46},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_3},
  doi          = {10.1007/978-3-642-13869-0\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/KostiainenDESA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KrautheimPS10,
  author       = {F. John Krautheim and
                  Dhananjay S. Phatak and
                  Alan T. Sherman},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Introducing the Trusted Virtual Environment Module: {A} New Mechanism
                  for Rooting Trust in Cloud Computing},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {211--227},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_14},
  doi          = {10.1007/978-3-642-13869-0\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KrautheimPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KrzywieckiK10,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Lagrangian E-Voting: Verifiability on Demand and Strong Privacy},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {109--123},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_8},
  doi          = {10.1007/978-3-642-13869-0\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KrzywieckiK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LiMP10,
  author       = {Yanlin Li and
                  Jonathan M. McCune and
                  Adrian Perrig},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {{SBAP:} Software-Based Attestation for Peripherals},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_2},
  doi          = {10.1007/978-3-642-13869-0\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LiMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LiR10,
  author       = {Jiangtao Li and
                  Anand Rajan},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {An Anonymous Attestation Scheme with Optional Traceability},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {196--210},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_13},
  doi          = {10.1007/978-3-642-13869-0\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LiR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Lieberknecht10,
  author       = {Nora Lieberknecht},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Application of Trusted Computing in Automation to Prevent Product
                  Piracy},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {95--108},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_7},
  doi          = {10.1007/978-3-642-13869-0\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Lieberknecht10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LyleM10,
  author       = {John Lyle and
                  Andrew P. Martin},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Engineering Attestable Services},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {257--264},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_17},
  doi          = {10.1007/978-3-642-13869-0\_17},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LyleM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NaumanKZS10,
  author       = {Mohammad Nauman and
                  Sohail Khan and
                  Xinwen Zhang and
                  Jean{-}Pierre Seifert},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation
                  for the Android Platform},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_1},
  doi          = {10.1007/978-3-642-13869-0\_1},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/NaumanKZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/PirkerTG10,
  author       = {Martin Pirker and
                  Ronald Toegl and
                  Michael Gissing},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Dynamic Enforcement of Platform Integrity},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {265--272},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_18},
  doi          = {10.1007/978-3-642-13869-0\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/PirkerTG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/PotzschB10,
  author       = {Stefanie P{\"{o}}tzsch and
                  Rainer B{\"{o}}hme},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {The Role of Soft Information in Trust Building: Evidence from Online
                  Social Lending},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {381--395},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_28},
  doi          = {10.1007/978-3-642-13869-0\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/PotzschB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/RoweWR10,
  author       = {Brent Rowe and
                  Dallas Wood and
                  Douglas S. Reeves},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {How the Public Views Strategies Designed to Reduce the Threat of Botnets},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {337--351},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_25},
  doi          = {10.1007/978-3-642-13869-0\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/RoweWR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Ruhrmair10,
  author       = {Ulrich R{\"{u}}hrmair},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Oblivious Transfer Based on Physical Unclonable Functions},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {430--440},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_31},
  doi          = {10.1007/978-3-642-13869-0\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Ruhrmair10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SadeghiSW10,
  author       = {Ahmad{-}Reza Sadeghi and
                  Thomas Schneider and
                  Marcel Winandy},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Token-Based Cloud Computing},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {417--429},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_30},
  doi          = {10.1007/978-3-642-13869-0\_30},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/SadeghiSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SelhorstSFG10,
  author       = {Marcel Selhorst and
                  Christian St{\"{u}}ble and
                  Florian Feldmann and
                  Utz Gnaida},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Towards a Trusted Mobile Desktop},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {78--94},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_6},
  doi          = {10.1007/978-3-642-13869-0\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SelhorstSFG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ShettySW10,
  author       = {Nikhil Shetty and
                  Galina Schwartz and
                  Jean C. Walrand},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Can Competitive Insurers Improve Network Security?},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_23},
  doi          = {10.1007/978-3-642-13869-0\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ShettySW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/StubleZ10,
  author       = {Christian St{\"{u}}ble and
                  Anoosheh Zaerin},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {\emph{{\(\mathrm{\mu}\)}}TSS - {A} Simplified Trusted Software Stack},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {124--140},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_9},
  doi          = {10.1007/978-3-642-13869-0\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/StubleZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Tan10,
  author       = {Jun{-}E Tan},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {The Leap of Faith from Online to Offline: An Exploratory Study of
                  Couchsurfing.org},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {367--380},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_27},
  doi          = {10.1007/978-3-642-13869-0\_27},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Tan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Thomborson10,
  author       = {Clark D. Thomborson},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Axiomatic and Behavioural Trust},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {352--366},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_26},
  doi          = {10.1007/978-3-642-13869-0\_26},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Thomborson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VasudevanMQDP10,
  author       = {Amit Vasudevan and
                  Jonathan M. McCune and
                  Ning Qu and
                  Leendert van Doorn and
                  Adrian Perrig},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Requirements for an Integrity-Protected Hypervisor on the x86 Hardware
                  Virtualized Architecture},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {141--165},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_10},
  doi          = {10.1007/978-3-642-13869-0\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/VasudevanMQDP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VrakasKTL10,
  author       = {Nikos Vrakas and
                  Christos Kalloniatis and
                  Aggeliki Tsohou and
                  Costas Lambrinoudakis},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Privacy Requirements Engineering for Trustworthy e-Government Services},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {298--307},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_22},
  doi          = {10.1007/978-3-642-13869-0\_22},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/VrakasKTL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2010,
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0},
  doi          = {10.1007/978-3-642-13869-0},
  isbn         = {978-3-642-13868-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics