default search action
TRUST 2011: Pittsburgh, PA, USA
- Jonathan M. McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, M. Angela Sasse, Yolanta Beres:
Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings. Lecture Notes in Computer Science 6740, Springer 2011, ISBN 978-3-642-21598-8
Cloud and Virtualization
- Cornelius Namiluko, Jun Ho Huh, Andrew P. Martin:
Verifying Trustworthiness of Virtual Appliances in Collaborative Environments. 1-15 - Kurt Dietrich, Johannes Winter:
Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems. 16-32
Physically Unclonable Functions
- Dominik Merli, Dieter Schuster, Frederic Stumpf, Georg Sigl:
Side-Channel Analysis of PUFs and Fuzzy Extractors. 33-47 - Lukasz Krzywiecki, Miroslaw Kutylowski:
Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF. 48-62 - Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik, Wei Wu:
A Practical Device Authentication Scheme Using SRAM PUFs. 63-77
Mobile Device Security
- Kari Kostiainen, N. Asokan, Jan-Erik Ekberg:
Practical Property-Based Attestation on Mobile Devices. 78-92 - Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh:
Taming Information-Stealing Smartphone Applications (on Android). 93-107 - Ingo Bente, Gabi Dreo, Bastian Hellmann, Stephan Heuser, Jörg Vieweg, Josef von Helden, Johannes Westhuis:
Towards Permission-Based Attestation for the Android Platform - (Short Paper). 108-115
Socio-Economic Aspects of Trust
- Miguel Malheiros, Charlene Jennett, William Seager, Martina Angela Sasse:
Trusting to Learn: Trust and Privacy Issues in Serious Games. 116-130 - Luca Allodi, Luca Chiodi, Marco Cremonini:
Modifying Trust Dynamics through Cooperation and Defection in Evolving Social Networks. 131-145 - Yang Wang, Gregory Norcie, Lorrie Faith Cranor:
Who Is Concerned about What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites - (Short Paper). 146-153
Hardware Trust
- Ruirui C. Huang, David Grawrock, David C. Doughty, G. Edward Suh:
Systematic Security Assessment at an Early Processor Design Stage. 154-171 - Peter Williams, Rick Boivie:
CPU Support for Secure Executables. 172-187 - Pravin Prabhu, Ameen Akel, Laura M. Grupp, Wing-Kei S. Yu, G. Edward Suh, Edwin Kan, Steven Swanson:
Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations. 188-201 - Michael LeMay, Carl A. Gunter:
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor. 202-216
Access Control
- Mark Baugher, Victor Lortz:
Home-Network Threats and Access Controls. 217-230 - Tongbo Luo, Wenliang Du:
Contego: Capability-Based Access Control for Web Browsers - (Short Paper). 231-238
Privacy
- Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik:
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information. 239-253 - Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser, Vijay Varadharajan:
CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper). 254-261
Trust Issues in Routing
- Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky, Insup Lee:
AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP. 262-276 - Gregory Frazier, Quang Duong, Michael P. Wellman, Edward Petersen:
Incentivizing Responsible Networking via Introduction-Based Routing. 277-293
Crypto-Physical Protocols
- Russell A. Fink, Alan T. Sherman, Alexander O. Mitchell, David C. Challener:
Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper). 294-301 - Srdjan Capkun, Karim M. El Defrawy, Gene Tsudik:
Group Distance Bounding Protocols - (Short Paper). 302-312
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.