


default search action
TRUST 2013: London, UK
- Michael Huth, N. Asokan

, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp:
Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7904, Springer 2013, ISBN 978-3-642-38907-8
Technical Strand
- Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil D. Gligor:

KISS: "Key It Simple and Secure" Corporate Key Management. 1-18 - Yueqiang Cheng, Xuhua Ding

:
Guardian: Hypervisor as Security Foothold for Personal Computers. 19-36 - Jan Nordholz, Ronald Aigner, Paul England:

Improving Trusted Tickets with State-Bound Keys. 37-46 - Klaus Potzmader, Johannes Winter, Daniel M. Hein, Christian Hanser, Peter Teufl, Liqun Chen

:
Group Signatures on Mobile Devices: Practical Experiences. 47-64 - Mirko Montanari, Jun Ho Huh, Rakesh Bobba, Roy H. Campbell:

Limiting Data Exposure in Monitoring Multi-domain Policy Conformance. 65-82 - Ghassan Karame:

Towards Trustworthy Network Measurements. 83-91 - Molka Ben-Romdhane, Tarik Graba, Jean-Luc Danger:

Stochastic Model of a Metastability-Based True Random Number Generator. 92-105 - Martin Pirker

, Johannes Winter:
Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform. 106-114 - Sandeep Tamrakar, Jan-Erik Ekberg:

Tapping and Tripping with NFC. 115-132 - Wei Feng, Dengguo Feng, Ge Wei, Yu Qin, Qianying Zhang, Dexian Chang:

TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications. 133-141 - Chris Burnett, Peter Edwards

, Timothy J. Norman, Liang Chen, Yogachandran Rahulamathavan, Mariesha Jaffray, Edoardo Pignotti:
TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas. 142-150 - Eric Hennigan, Christoph Kerschbaumer, Stefan Brunthaler, Per Larsen, Michael Franz:

First-Class Labels: Using Information Flow to Debug Security Holes. 151-168 - Heqing Huang, Sencun Zhu, Peng Liu, Dinghao Wu:

A Framework for Evaluating Mobile App Repackaging Detection Algorithms. 169-186 - Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz:

Towards Precise and Efficient Information Flow Control in Web Browsers. 187-195
Socio-Economic Strand
- Ann Light

, Lizzie Coles-Kemp:
Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook. 196-204 - Steffen Bartsch, Melanie Volkamer, Heike Theuerling, Fatih Karayumak:

Contextualized Web Warnings, and How They Cause Distrust. 205-222 - Marc Busch, Christina Hochleitner, Mario Lorenz, Trenton Schulz

, Manfred Tscheligi
, Eckhart Wittstock:
All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things. 223-231 - Gabrielle Anderson, Matthew Collinson, David J. Pym:

Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach. 232-249 - Miguel Malheiros, Sören Preibusch, Martina Angela Sasse:

"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure. 250-266
Poster Abstracts
- Shamal Faily, David Power, Philip Armstrong, Ivan Flechais:

Formal Evaluation of Persona Trustworthiness with EUSTACE - (Extended Abstract). 267-268 - Lyzgeo Merin Koshy, Marc Conrad, Mitul Shukla, Tim French:

Identity Implies Trust in Distributed Systems - A Novel Approach - (Extended Abstract). 269-270 - Nicholas Micallef

, Mike Just
, Lynne Baillie
, Hilmi Günes Kayacik:
Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract). 271-272 - Valentinos Evripidou, Francesca Toni:

Quaestio-it.com: From Debates Towards Trustworthy Answers - (Extended Abstract). 273-274 - Michael Huth, Jim Huan-Pu Kuo:

Towards Verifiable Trust Management for Software Execution - (Extended Abstract). 275-276

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














