Login / Signup
TRUST
2008
2011
2016
2008
2016
Keyphrases
Publications
2016
Jan Camenisch
,
Manu Drijvers
,
Anja Lehmann
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited.
TRUST
(2016)
Paul D. Rowe
Bundling Evidence for Layered Attestation.
TRUST
(2016)
Linus Karlsson
,
Martin Hell
Enabling Key Migration Between Non-compatible TPM Versions.
TRUST
(2016)
Thomas Hupperich
,
Katharina Krombholz
,
Thorsten Holz
Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness.
TRUST
(2016)
Paolo Zicari
,
Roberto Interdonato
,
Diego Perna
,
Andrea Tagarelli
,
Sergio Greco
Controversy in Trust Networks.
TRUST
(2016)
Matthias Neugschwandtner
,
Collin Mulliner
,
William K. Robertson
,
Engin Kirda
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices.
TRUST
(2016)
Alexander Spenke
,
Ralph Breithaupt
,
Rainer Plaga
An Arbiter PUF Secured by Remote Random Reconfigurations of an FPGA.
TRUST
(2016)
Michael Till Beck
,
Stephan Krenn
,
Franz-Stefan Preiss
,
Kai Samelin
Practical Signing-Right Revocation.
TRUST
(2016)
volume 9824, 2016
Trust and Trustworthy Computing - 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings
TRUST
9824 (2016)
2015
Melanie Volkamer
,
Karen Renaud
,
Gamze Canova
,
Benjamin Reinheimer
,
Kristoffer Braun
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
TRUST
(2015)
Hamed Nemati
,
Mads Dam
,
Roberto Guanciale
,
Viktor Do
,
Arash Vahidi
Trustworthy Memory Isolation of Linux on Embedded Devices.
TRUST
(2015)
Christos V. Samaras
,
Ageliki Tsioliaridou
,
Christos Liaskos
,
Dimitris Spiliotopoulos
,
Sotiris Ioannidis
Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering.
TRUST
(2015)
David Förster
,
Hans Löhr
,
Jan Zibuschka
,
Frank Kargl
REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks.
TRUST
(2015)
Andrei Lutas
,
Sándor Lukács
,
Adrian Colesa
,
Dan Lutas
Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection.
TRUST
(2015)
Adrian Colesa
,
Sándor Lukács
,
Vlad Topan
,
Radu Ciocas
,
Adrian Pop
Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications.
TRUST
(2015)
Qingqing Chen
,
Ulrich Rührmair
,
Spoorthy Narayana
,
Uzair Sharif
,
Ulf Schlichtmann
MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography.
TRUST
(2015)
Frederik Armknecht
,
Ghassan O. Karame
,
Avikarsha Mandal
,
Franck Youssef
,
Erik Zenner
Ripple: Overview and Outlook.
TRUST
(2015)
Thomas Nyman
,
Brian McGillion
,
N. Asokan
On Making Emerging Trusted Execution Environments Accessible to Developers.
TRUST
(2015)
Shijun Zhao
,
Qianying Zhang
A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0.
TRUST
(2015)
Sourav Bhattacharya
,
Otto Huhta
,
N. Asokan
LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling.
TRUST
(2015)
Bo Yang
,
Kang Yang
,
Yu Qin
,
Zhenfeng Zhang
,
Dengguo Feng
DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone.
TRUST
(2015)
Fatemeh Ganji
,
Shahin Tajik
,
Jean-Pierre Seifert
Why Attackers Win: On the Learnability of XOR Arbiter PUFs.
TRUST
(2015)
Florian Kohnhäuser
,
André Schaller
,
Stefan Katzenbeisser
PUF-Based Software Protection for Low-End Embedded Devices.
TRUST
(2015)
Liqun Chen
,
Rainer Urian
DAA-A: Direct Anonymous Attestation with Attributes.
TRUST
(2015)
Ghassan O. Karame
,
Wenting Li
Secure Erasure and Code Update in Legacy Sensors.
TRUST
(2015)
Michalis Kanakakis
,
Shenja van der Graaf
,
Costas Kalogiros
,
Wim Vanobberghen
Computing Trust Levels Based on User's Personality and Observed System Trustworthiness.
TRUST
(2015)
Patrick Koeberl
,
Vinay Phegade
,
Anand Rajan
,
Thomas Schneider
,
Steffen Schulz
,
Maria Zhdanova
Time to Rethink: Trust Brokerage Using Trusted Execution Environments.
TRUST
(2015)
volume 9229, 2015
Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings
TRUST
9229 (2015)
2014
Nazila Gol Mohammadi
,
Torsten Bandyszak
,
Sachar Paulus
,
Per Håkon Meland
,
Thorsten Weyer
,
Klaus Pohl
Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract).
TRUST
(2014)
Dhouha Ayed
,
Patrik Bichsel
,
Jan Camenisch
,
Jerry den Hartog
Integration of Data-Minimising Authentication into Authorisation Systems.
TRUST
(2014)
Yajin Zhou
,
Kapil Singh
,
Xuxian Jiang
Owner-Centric Protection of Unstructured Data on Smartphones.
TRUST
(2014)
Kostantinos Stroggylos
,
Dimitris Mitropoulos
,
Zacharias Tzermias
,
Panagiotis Papadopoulos
,
Fotios Rafailidis
,
Diomidis Spinellis
,
Sotiris Ioannidis
,
Panagiotis Katsaros
TRACER: A Platform for Securing Legacy Code.
TRUST
(2014)
Jens-Matthias Bohli
,
Dan Dobre
,
Ghassan O. Karame
,
Wenting Li
PrivLoc: Preventing Location Tracking in Geofencing Services.
TRUST
(2014)
Ying He
,
Chris W. Johnson
,
Maria Evangelopoulou
,
Zheng-Shuai Lin
Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive Dimensions.
TRUST
(2014)
Elli Androulaki
,
Ghassan O. Karame
Hiding Transaction Amounts and Balances in Bitcoin.
TRUST
(2014)
Vinh T. Bui
,
Richard Verhoeven
,
Johan Lukkien
Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant.
TRUST
(2014)
Panos Chatziadam
,
Ioannis G. Askoxylakis
,
Nikolaos E. Petroulakis
,
Alexandros G. Fragkiadakis
Early Warning Intrusion Detection System.
TRUST
(2014)
Doudou Fall
,
Takeshi Okuda
,
Youki Kadobayashi
,
Suguru Yamaguchi
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture.
TRUST
(2014)
Tom van Goethem
,
Ping Chen
,
Nick Nikiforakis
,
Lieven Desmet
,
Wouter Joosen
Large-Scale Security Analysis of the Web: Challenges and Findings.
TRUST
(2014)
Kazuo Ohzeki
,
Yuanyu Wei
,
Masaaki Kajihara
,
Masahiro Takatsuka
,
Yutaka Hirakawa
,
Toru Sugimoto
Authentication System Using Encrypted Discrete Biometrics Data.
TRUST
(2014)
André Schaller
,
Tolga Arul
,
Vincent van der Leest
,
Stefan Katzenbeisser
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs.
TRUST
(2014)
Li Xi
,
Kang Yang
,
Zhenfeng Zhang
,
Dengguo Feng
DAA-Related APIs in TPM 2.0 Revisited.
TRUST
(2014)
John Zic
Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents - (Extended Abstract).
TRUST
(2014)
Panagiotis Andriotis
,
Theo Tryfonas
,
George C. Oikonomou
,
Shancang Li
,
Zacharias Tzermias
,
Konstantinos Xynos
,
Huw Read
,
Vassilis Prevelakis
On the Development of Automated Forensic Analysis Methods for Mobile Devices.
TRUST
(2014)
Benjamin Henne
,
Christian Kater
,
Matthew Smith
On Usable Location Privacy for Android with Crowd-Recommendations.
TRUST
(2014)
Oliver Schwarz
,
Christian Gehrmann
,
Viktor Do
Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System.
TRUST
(2014)
Dieter Schuster
,
Robert Hesselbarth
Evaluation of Bistable Ring PUFs Using Single Layer Neural Networks.
TRUST
(2014)
Thanasis Petsas
,
Kazuya Okada
,
Hajime Tazaki
,
Gregory Blanc
,
Pawel Pawlinski
A Trusted Knowledge Management System for Multi-layer Threat Analysis.
TRUST
(2014)
Manolis Stamatogiannakis
,
Paul Groth
,
Herbert Bos
Facilitating Trust on Data through Provenance.
TRUST
(2014)
volume 8564, 2014
Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings
TRUST
8564 (2014)