


default search action
TRUST 2010: Berlin, Germany
- Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi:

Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6101, Springer 2010, ISBN 978-3-642-13868-3
Technical Strand - Full Papers
- Mohammad Nauman

, Sohail Khan
, Xinwen Zhang, Jean-Pierre Seifert:
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. 1-15 - Yanlin Li, Jonathan M. McCune, Adrian Perrig:

SBAP: Software-Based Attestation for Peripherals. 16-29 - Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, N. Asokan

:
Key Attestation from Trusted Execution Environments. 30-46 - Emanuele Cesena, Hans Löhr, Gianluca Ramunno, Ahmad-Reza Sadeghi, Davide Vernizzi:

Anonymous Authentication with TLS and DAA. 47-62 - Sami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser:

Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation. 63-77 - Marcel Selhorst, Christian Stüble, Florian Feldmann, Utz Gnaida:

Towards a Trusted Mobile Desktop. 78-94 - Nora Lieberknecht:

Application of Trusted Computing in Automation to Prevent Product Piracy. 95-108 - Lukasz Krzywiecki

, Miroslaw Kutylowski:
Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. 109-123 - Christian Stüble, Anoosheh Zaerin:

µTSS - A Simplified Trusted Software Stack. 124-140 - Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn, Adrian Perrig:

Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture. 141-165 - Liqun Chen

:
A DAA Scheme Using Batch Proof and Verification. 166-180 - Ernie Brickell, Jiangtao Li:

A Pairing-Based DAA Scheme Further Reducing TPM Resources. 181-195 - Jiangtao Li, Anand Rajan:

An Anonymous Attestation Scheme with Optional Traceability. 196-210 - F. John Krautheim, Dhananjay S. Phatak, Alan T. Sherman:

Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. 211-227 - Sergey Bratus, Michael E. Locasto, Brian Schulte:

SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms. 228-245
Technical Strand - Short Papers
- King Ables, Mark Dermot Ryan

:
Escrowed Data and the Digital Envelope. 246-256 - John Lyle, Andrew P. Martin

:
Engineering Attestable Services. 257-264 - Martin Pirker

, Ronald Toegl, Michael Gissing:
Dynamic Enforcement of Platform Integrity. 265-272 - Yin Hu, Berk Sunar:

An Improved Memory Integrity Protection Scheme. 273-281 - Amir Herzberg, Haya Schulmann:

Robust Combiners for Software Hardening. 282-289 - Heike Busch, Miroslava Sotáková, Stefan Katzenbeisser, Radu Sion:

The PUF Promise. 290-297
Socio-Economic Strand
- Nikos Vrakas, Christos Kalloniatis, Aggeliki Tsohou, Costas Lambrinoudakis

:
Privacy Requirements Engineering for Trustworthy e-Government Services. 298-307 - Nikhil Shetty, Galina Schwartz, Jean C. Walrand:

Can Competitive Insurers Improve Network Security? 308-322 - Jens Grossklags, Svetlana Radosavac, Alvaro A. Cárdenas

, John Chuang
:
Nudge: Intermediaries' Role in Interdependent Network Security. 323-336 - Brent Rowe, Dallas Wood, Douglas S. Reeves:

How the Public Views Strategies Designed to Reduce the Threat of Botnets. 337-351 - Clark D. Thomborson

:
Axiomatic and Behavioural Trust. 352-366 - Jun-E Tan:

The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.org. 367-380 - Stefanie Pötzsch, Rainer Böhme:

The Role of Soft Information in Trust Building: Evidence from Online Social Lending. 381-395 - Sergey Bratus, Ashlyn Lembree, Anna Shubina:

Software on the Witness Stand: What Should It Take for Us to Trust It? 396-416
Workshop on Trust in the Cloud
- Ahmad-Reza Sadeghi, Thomas Schneider

, Marcel Winandy:
Token-Based Cloud Computing. 417-429
Workshop on Security Hardware
- Ulrich Rührmair:

Oblivious Transfer Based on Physical Unclonable Functions. 430-440

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














