Amazon cover image
Image from Amazon.com

Trust and trustworthy computing : 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings / Stefan Katzenbeisser [and others] (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 7344. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642309212
  • 3642309216
Other title:
  • TRUST 2012
Subject(s): Genre/Form: Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 T78 2012
Online resources:
Contents:
Authenticated Encryption Primitives for Size-Constrained Trusted Computing / Jan-Erik Ekberg, Alexandra Afanasyeva and N. Asokan -- Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing / Matt Smart and Eike Ritter -- Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms / Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor and Adrian Perrig -- Experimenting with Fast Private Set Intersection / Emiliano De Cristofaro and Gene Tsudik -- Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing / Daniel Sangorrín, Shinya Honda and Hiroaki Takada -- Modelling User-Centered-Trust (UCT) in Software Systems: Interplay of Trust, Affect and Acceptance Model / Zahid Hasan, Alina Krischkowsky and Manfred Tscheligi -- Clockless Physical Unclonable Functions / Julian Murphy -- Lightweight Distributed Heterogeneous Attested Android Clouds / Martin Pirker, Johannes Winter and Ronald Toegl -- Converse PUF-Based Authentication / Ünal Kocabaş, Andreas Peter, Stefan Katzenbeisser and Ahmad-Reza Sadeghi -- Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? / Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome and Jonathan M. McCune -- Verifying System Integrity by Proxy / Joshua Schiffman, Hayawardh Vijayakumar and Trent Jaeger -- Virtualization Based Password Protection against Malware in Untrusted Operating Systems / Yueqiang Cheng and Xuhua Ding -- SmartTokens: Delegable Access Control with NFC-Enabled Smartphones / Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar and Christian Wachsmann -- A Belief Logic for Analyzing Security of Web Protocols / Apurva Kumar -- Provenance-Based Model for Verifying Trust-Properties / Cornelius Namiluko and Andrew Martin -- On the Practicality of Motion Based Keystroke Inference Attack / Liang Cai and Hao Chen -- AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale / Clint Gibler, Jonathan Crussell, Jeremy Erickson and Hao Chen -- Why Trust Seals Don't Work: A Study of User Perceptions and Behavior / Iacovos Kirlappos, M. Angela Sasse and Nigel Harvey -- Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns / Saijing Zheng, Pan Shi, Heng Xu and Cheng Zhang.
Summary: This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Authenticated Encryption Primitives for Size-Constrained Trusted Computing / Jan-Erik Ekberg, Alexandra Afanasyeva and N. Asokan -- Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing / Matt Smart and Eike Ritter -- Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms / Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor and Adrian Perrig -- Experimenting with Fast Private Set Intersection / Emiliano De Cristofaro and Gene Tsudik -- Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing / Daniel Sangorrín, Shinya Honda and Hiroaki Takada -- Modelling User-Centered-Trust (UCT) in Software Systems: Interplay of Trust, Affect and Acceptance Model / Zahid Hasan, Alina Krischkowsky and Manfred Tscheligi -- Clockless Physical Unclonable Functions / Julian Murphy -- Lightweight Distributed Heterogeneous Attested Android Clouds / Martin Pirker, Johannes Winter and Ronald Toegl -- Converse PUF-Based Authentication / Ünal Kocabaş, Andreas Peter, Stefan Katzenbeisser and Ahmad-Reza Sadeghi -- Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? / Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome and Jonathan M. McCune -- Verifying System Integrity by Proxy / Joshua Schiffman, Hayawardh Vijayakumar and Trent Jaeger -- Virtualization Based Password Protection against Malware in Untrusted Operating Systems / Yueqiang Cheng and Xuhua Ding -- SmartTokens: Delegable Access Control with NFC-Enabled Smartphones / Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar and Christian Wachsmann -- A Belief Logic for Analyzing Security of Web Protocols / Apurva Kumar -- Provenance-Based Model for Verifying Trust-Properties / Cornelius Namiluko and Andrew Martin -- On the Practicality of Motion Based Keystroke Inference Attack / Liang Cai and Hao Chen -- AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale / Clint Gibler, Jonathan Crussell, Jeremy Erickson and Hao Chen -- Why Trust Seals Don't Work: A Study of User Perceptions and Behavior / Iacovos Kirlappos, M. Angela Sasse and Nigel Harvey -- Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns / Saijing Zheng, Pan Shi, Heng Xu and Cheng Zhang.

Includes bibliographical references and author index.

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

English.

Powered by Koha