Limit search to available items
Book Cover
E-book
Author TRUST (Conference) (5th : 2012 : Vienna, Austria)

Title Trust and trustworthy computing : 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings / Stefan Katzenbeisser [and others] (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7344
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7344.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Authenticated Encryption Primitives for Size-Constrained Trusted Computing / Jan-Erik Ekberg, Alexandra Afanasyeva and N. Asokan -- Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing / Matt Smart and Eike Ritter -- Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms / Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor and Adrian Perrig -- Experimenting with Fast Private Set Intersection / Emiliano De Cristofaro and Gene Tsudik -- Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing / Daniel Sangorrín, Shinya Honda and Hiroaki Takada -- Modelling User-Centered-Trust (UCT) in Software Systems: Interplay of Trust, Affect and Acceptance Model / Zahid Hasan, Alina Krischkowsky and Manfred Tscheligi -- Clockless Physical Unclonable Functions / Julian Murphy -- Lightweight Distributed Heterogeneous Attested Android Clouds / Martin Pirker, Johannes Winter and Ronald Toegl -- Converse PUF-Based Authentication / Ünal Kocabaş, Andreas Peter, Stefan Katzenbeisser and Ahmad-Reza Sadeghi -- Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? / Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome and Jonathan M. McCune -- Verifying System Integrity by Proxy / Joshua Schiffman, Hayawardh Vijayakumar and Trent Jaeger -- Virtualization Based Password Protection against Malware in Untrusted Operating Systems / Yueqiang Cheng and Xuhua Ding -- SmartTokens: Delegable Access Control with NFC-Enabled Smartphones / Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar and Christian Wachsmann -- A Belief Logic for Analyzing Security of Web Protocols / Apurva Kumar -- Provenance-Based Model for Verifying Trust-Properties / Cornelius Namiluko and Andrew Martin -- On the Practicality of Motion Based Keystroke Inference Attack / Liang Cai and Hao Chen -- AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale / Clint Gibler, Jonathan Crussell, Jeremy Erickson and Hao Chen -- Why Trust Seals Don't Work: A Study of User Perceptions and Behavior / Iacovos Kirlappos, M. Angela Sasse and Nigel Harvey -- Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns / Saijing Zheng, Pan Shi, Heng Xu and Cheng Zhang
Summary This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security
Analysis Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
computerwetenschappen
computer sciences
informatiesystemen
internet
algoritmen
algorithms
computeranalyse
computer analysis
computers
samenleving
society
gegevensbeheer
data management
computernetwerken
computer networks
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography Includes bibliographical references and author index
Notes English
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Informatique.
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Katzenbeisser, Stefan.
ISBN 9783642309212
3642309216
Other Titles TRUST 2012