default search action
TRUST 2014: Heraklion, Crete, Greece
- Thorsten Holz, Sotiris Ioannidis:
Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings. Lecture Notes in Computer Science 8564, Springer 2014, ISBN 978-3-319-08592-0
TPM 2.0
- Li Xi, Kang Yang, Zhenfeng Zhang, Dengguo Feng:
DAA-Related APIs in TPM 2.0 Revisited. 1-18 - Arunesh Sinha, Limin Jia, Paul England, Jacob R. Lorch:
Continuous Tamper-Proof Logging Using TPM 2.0. 19-36
Trust in Embedded and Mobile Systems
- Oliver Schwarz, Christian Gehrmann, Viktor Do:
Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System. 37-54 - Yajin Zhou, Kapil Singh, Xuxian Jiang:
Owner-Centric Protection of Unstructured Data on Smartphones. 55-73 - Benjamin Henne, Christian Kater, Matthew Smith:
On Usable Location Privacy for Android with Crowd-Recommendations. 74-82
Physical Unclonable Functions
- André Schaller, Tolga Arul, Vincent van der Leest, Stefan Katzenbeisser:
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs. 83-100 - Dieter Schuster, Robert Hesselbarth:
Evaluation of Bistable Ring PUFs Using Single Layer Neural Networks. 101-109
Trust in the Web
- Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, Wouter Joosen:
Large-Scale Security Analysis of the Web: Challenges and Findings. 110-126 - Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture. 127-142 - Jens-Matthias Bohli, Dan Dobre, Ghassan O. Karame, Wenting Li:
PrivLoc: Preventing Location Tracking in Geofencing Services. 143-160
Trust and Trustworthiness
- Elli Androulaki, Ghassan O. Karame:
Hiding Transaction Amounts and Balances in Bitcoin. 161-178 - Dhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog:
Integration of Data-Minimising Authentication into Authorisation Systems. 179-187 - Vinh T. Bui, Richard Verhoeven, Johan Lukkien:
Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant. 188-205
Poster Abstracts
- Nazila Gol Mohammadi, Torsten Bandyszak, Sachar Paulus, Per Håkon Meland, Thorsten Weyer, Klaus Pohl:
Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract). 206-207 - John Zic:
Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents - (Extended Abstract). 208-209 - Kazuo Ohzeki, Yuanyu Wei, Masaaki Kajihara, Masahiro Takatsuka, Yutaka Hirakawa, Toru Sugimoto:
Authentication System Using Encrypted Discrete Biometrics Data. 210-211 - Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Shancang Li, Zacharias Tzermias, Konstantinos Xynos, Huw Read, Vassilis Prevelakis:
On the Development of Automated Forensic Analysis Methods for Mobile Devices. 212-213 - Thanasis Petsas, Kazuya Okada, Hajime Tazaki, Gregory Blanc, Pawel Pawlinski:
A Trusted Knowledge Management System for Multi-layer Threat Analysis. 214-215 - Ying He, Chris W. Johnson, Maria Evangelopoulou, Zheng-Shuai Lin:
Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive Dimensions. 216-217 - Kostantinos Stroggylos, Dimitris Mitropoulos, Zacharias Tzermias, Panagiotis Papadopoulos, Fotios Rafailidis, Diomidis Spinellis, Sotiris Ioannidis, Panagiotis Katsaros:
TRACER: A Platform for Securing Legacy Code. 218-219 - Manolis Stamatogiannakis, Paul Groth, Herbert Bos:
Facilitating Trust on Data through Provenance. 220-221 - Panos Chatziadam, Ioannis G. Askoxylakis, Nikolaos E. Petroulakis, Alexandros G. Fragkiadakis:
Early Warning Intrusion Detection System. 222-223
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.