


default search action
TRUST 2014: Heraklion, Crete, Greece
- Thorsten Holz

, Sotiris Ioannidis:
Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings. Lecture Notes in Computer Science 8564, Springer 2014, ISBN 978-3-319-08592-0
TPM 2.0
- Li Xi, Kang Yang, Zhenfeng Zhang, Dengguo Feng:

DAA-Related APIs in TPM 2.0 Revisited. 1-18 - Arunesh Sinha

, Limin Jia
, Paul England, Jacob R. Lorch:
Continuous Tamper-Proof Logging Using TPM 2.0. 19-36
Trust in Embedded and Mobile Systems
- Oliver Schwarz, Christian Gehrmann, Viktor Do:

Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System. 37-54 - Yajin Zhou, Kapil Singh, Xuxian Jiang:

Owner-Centric Protection of Unstructured Data on Smartphones. 55-73 - Benjamin Henne, Christian Kater, Matthew Smith:

On Usable Location Privacy for Android with Crowd-Recommendations. 74-82
Physical Unclonable Functions
- André Schaller, Tolga Arul

, Vincent van der Leest, Stefan Katzenbeisser:
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs. 83-100 - Dieter Schuster, Robert Hesselbarth:

Evaluation of Bistable Ring PUFs Using Single Layer Neural Networks. 101-109
Trust in the Web
- Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, Wouter Joosen:

Large-Scale Security Analysis of the Web: Challenges and Findings. 110-126 - Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:

Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture. 127-142 - Jens-Matthias Bohli, Dan Dobre, Ghassan O. Karame, Wenting Li

:
PrivLoc: Preventing Location Tracking in Geofencing Services. 143-160
Trust and Trustworthiness
- Elli Androulaki, Ghassan O. Karame:

Hiding Transaction Amounts and Balances in Bitcoin. 161-178 - Dhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog:

Integration of Data-Minimising Authentication into Authorisation Systems. 179-187 - Vinh T. Bui, Richard Verhoeven, Johan Lukkien:

Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant. 188-205
Poster Abstracts
- Nazila Gol Mohammadi, Torsten Bandyszak, Sachar Paulus, Per Håkon Meland, Thorsten Weyer, Klaus Pohl:

Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract). 206-207 - John Zic:

Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents - (Extended Abstract). 208-209 - Kazuo Ohzeki, Yuanyu Wei, Masaaki Kajihara, Masahiro Takatsuka, Yutaka Hirakawa, Toru Sugimoto:

Authentication System Using Encrypted Discrete Biometrics Data. 210-211 - Panagiotis Andriotis

, Theo Tryfonas
, George C. Oikonomou
, Shancang Li, Zacharias Tzermias, Konstantinos Xynos
, Huw Read
, Vassilis Prevelakis:
On the Development of Automated Forensic Analysis Methods for Mobile Devices. 212-213 - Thanasis Petsas, Kazuya Okada, Hajime Tazaki

, Gregory Blanc
, Pawel Pawlinski:
A Trusted Knowledge Management System for Multi-layer Threat Analysis. 214-215 - Ying He

, Chris W. Johnson, Maria Evangelopoulou, Zheng-Shuai Lin:
Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive Dimensions. 216-217 - Kostantinos Stroggylos, Dimitris Mitropoulos, Zacharias Tzermias, Panagiotis Papadopoulos

, Fotios Rafailidis, Diomidis Spinellis
, Sotiris Ioannidis, Panagiotis Katsaros
:
TRACER: A Platform for Securing Legacy Code. 218-219 - Manolis Stamatogiannakis, Paul Groth, Herbert Bos

:
Facilitating Trust on Data through Provenance. 220-221 - Panos Chatziadam, Ioannis G. Askoxylakis, Nikolaos E. Petroulakis

, Alexandros G. Fragkiadakis
:
Early Warning Intrusion Detection System. 222-223

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














