default search action
TRUST 2010: Berlin, Germany
- Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi:
Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6101, Springer 2010, ISBN 978-3-642-13868-3
Technical Strand - Full Papers
- Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-Pierre Seifert:
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. 1-15 - Yanlin Li, Jonathan M. McCune, Adrian Perrig:
SBAP: Software-Based Attestation for Peripherals. 16-29 - Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, N. Asokan:
Key Attestation from Trusted Execution Environments. 30-46 - Emanuele Cesena, Hans Löhr, Gianluca Ramunno, Ahmad-Reza Sadeghi, Davide Vernizzi:
Anonymous Authentication with TLS and DAA. 47-62 - Sami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser:
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation. 63-77 - Marcel Selhorst, Christian Stüble, Florian Feldmann, Utz Gnaida:
Towards a Trusted Mobile Desktop. 78-94 - Nora Lieberknecht:
Application of Trusted Computing in Automation to Prevent Product Piracy. 95-108 - Lukasz Krzywiecki, Miroslaw Kutylowski:
Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. 109-123 - Christian Stüble, Anoosheh Zaerin:
µTSS - A Simplified Trusted Software Stack. 124-140 - Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn, Adrian Perrig:
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture. 141-165 - Liqun Chen:
A DAA Scheme Using Batch Proof and Verification. 166-180 - Ernie Brickell, Jiangtao Li:
A Pairing-Based DAA Scheme Further Reducing TPM Resources. 181-195 - Jiangtao Li, Anand Rajan:
An Anonymous Attestation Scheme with Optional Traceability. 196-210 - F. John Krautheim, Dhananjay S. Phatak, Alan T. Sherman:
Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. 211-227 - Sergey Bratus, Michael E. Locasto, Brian Schulte:
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms. 228-245
Technical Strand - Short Papers
- King Ables, Mark Dermot Ryan:
Escrowed Data and the Digital Envelope. 246-256 - John Lyle, Andrew P. Martin:
Engineering Attestable Services. 257-264 - Martin Pirker, Ronald Toegl, Michael Gissing:
Dynamic Enforcement of Platform Integrity. 265-272 - Yin Hu, Berk Sunar:
An Improved Memory Integrity Protection Scheme. 273-281 - Amir Herzberg, Haya Schulmann:
Robust Combiners for Software Hardening. 282-289 - Heike Busch, Miroslava Sotáková, Stefan Katzenbeisser, Radu Sion:
The PUF Promise. 290-297
Socio-Economic Strand
- Nikos Vrakas, Christos Kalloniatis, Aggeliki Tsohou, Costas Lambrinoudakis:
Privacy Requirements Engineering for Trustworthy e-Government Services. 298-307 - Nikhil Shetty, Galina Schwartz, Jean C. Walrand:
Can Competitive Insurers Improve Network Security? 308-322 - Jens Grossklags, Svetlana Radosavac, Alvaro A. Cárdenas, John Chuang:
Nudge: Intermediaries' Role in Interdependent Network Security. 323-336 - Brent Rowe, Dallas Wood, Douglas S. Reeves:
How the Public Views Strategies Designed to Reduce the Threat of Botnets. 337-351 - Clark D. Thomborson:
Axiomatic and Behavioural Trust. 352-366 - Jun-E Tan:
The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.org. 367-380 - Stefanie Pötzsch, Rainer Böhme:
The Role of Soft Information in Trust Building: Evidence from Online Social Lending. 381-395 - Sergey Bratus, Ashlyn Lembree, Anna Shubina:
Software on the Witness Stand: What Should It Take for Us to Trust It? 396-416
Workshop on Trust in the Cloud
- Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy:
Token-Based Cloud Computing. 417-429
Workshop on Security Hardware
- Ulrich Rührmair:
Oblivious Transfer Based on Physical Unclonable Functions. 430-440
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.