BibTeX records: Kari Kostiainen

download as .bib file

@inproceedings{DBLP:conf/fc/WustKCC19,
  author    = {Karl W{\"{u}}st and
               Kari Kostiainen and
               Vedran Capkun and
               Srdjan Capkun},
  title     = {PRCash: Fast, Private and Regulated Transactions for Digital Currencies},
  booktitle = {Financial Cryptography and Data Security - 23rd International Conference,
               {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
               Revised Selected Papers},
  pages     = {158--178},
  year      = {2019},
  crossref  = {DBLP:conf/fc/2019},
  url       = {https://doi.org/10.1007/978-3-030-32101-7\_11},
  doi       = {10.1007/978-3-030-32101-7\_11},
  timestamp = {Mon, 14 Oct 2019 14:51:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/WustKCC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/WustMSMKC19,
  author    = {Karl W{\"{u}}st and
               Sinisa Matetic and
               Moritz Schneider and
               Ian Miers and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted
               Execution},
  booktitle = {Financial Cryptography and Data Security - 23rd International Conference,
               {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
               Revised Selected Papers},
  pages     = {179--198},
  year      = {2019},
  crossref  = {DBLP:conf/fc/2019},
  url       = {https://doi.org/10.1007/978-3-030-32101-7\_12},
  doi       = {10.1007/978-3-030-32101-7\_12},
  timestamp = {Mon, 14 Oct 2019 14:51:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/WustMSMKC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MateticWSKKC19,
  author    = {Sinisa Matetic and
               Karl W{\"{u}}st and
               Moritz Schneider and
               Kari Kostiainen and
               Ghassan Karame and
               Srdjan Capkun},
  title     = {{BITE:} Bitcoin Lightweight Client Privacy using Trusted Execution},
  booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
               CA, USA, August 14-16, 2019.},
  pages     = {783--800},
  year      = {2019},
  crossref  = {DBLP:conf/uss/2019},
  url       = {https://www.usenix.org/conference/usenixsecurity19/presentation/matetic},
  timestamp = {Tue, 03 Sep 2019 16:37:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/MateticWSKKC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WustMEKC19,
  author    = {Karl W{\"{u}}st and
               Sinisa Matetic and
               Silvan Egli and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {{ACE:} Asynchronous and Concurrent Execution of Complex Smart Contracts},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {835},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/835},
  timestamp = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WustMEKC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WustDKKMC19,
  author    = {Karl W{\"{u}}st and
               Loris Diana and
               Kari Kostiainen and
               Ghassan Karame and
               Sinisa Matetic and
               Srdjan Capkun},
  title     = {Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {857},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/857},
  timestamp = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WustDKKMC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DharUKC19,
  author    = {Aritra Dhar and
               Enis Ulqinaku and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {ProtectIOn: Root-of-Trust for {IO} in Compromised Platforms},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {869},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/869},
  timestamp = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DharUKC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-07391,
  author    = {Mansoor Ahmed and
               Kari Kostiainen},
  title     = {Identity Aging: Efficient Blockchain Consensus},
  journal   = {CoRR},
  volume    = {abs/1804.07391},
  year      = {2018},
  url       = {http://arxiv.org/abs/1804.07391},
  archivePrefix = {arXiv},
  eprint    = {1804.07391},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1804-07391},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WustKCC18,
  author    = {Karl W{\"{u}}st and
               Kari Kostiainen and
               Vedran Capkun and
               Srdjan Capkun},
  title     = {PRCash: Centrally-Issued Digital Currency with Privacy and Regulation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {412},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/412},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WustKCC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MateticWSKKC18,
  author    = {Sinisa Matetic and
               Karl W{\"{u}}st and
               Moritz Schneider and
               Kari Kostiainen and
               Ghassan Karame and
               Srdjan Capkun},
  title     = {{BITE:} Bitcoin Lightweight Client Privacy using Trusted Execution},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {803},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/803},
  timestamp = {Mon, 15 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MateticWSKKC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DharPKC18,
  author    = {Aritra Dhar and
               Ivan Puddu and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {ProximiTEE: Hardened {SGX} Attestation and Trusted Path through Proximity
               Verification},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {902},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/902},
  timestamp = {Mon, 15 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DharPKC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MateticWSMKC18,
  author    = {Sinisa Matetic and
               Karl W{\"{u}}st and
               Moritz Schneider and
               Ian Miers and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted
               Execution},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {1024},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1024},
  timestamp = {Tue, 13 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MateticWSMKC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MalisaKKSC17,
  author    = {Luka Malisa and
               Kari Kostiainen and
               Thomas Knell and
               David M. Sommer and
               Srdjan Capkun},
  title     = {Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
               Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  pages     = {468--489},
  year      = {2017},
  crossref  = {DBLP:conf/ches/2017},
  url       = {https://doi.org/10.1007/978-3-319-66787-4\_23},
  doi       = {10.1007/978-3-319-66787-4\_23},
  timestamp = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/MalisaKKSC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MalisaKC17,
  author    = {Luka Malisa and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {Detecting Mobile Application Spoofing Attacks by Leveraging User Visual
               Similarity Perception},
  booktitle = {Proceedings of the Seventh {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
               2017},
  pages     = {289--300},
  year      = {2017},
  crossref  = {DBLP:conf/codaspy/2017},
  url       = {https://doi.org/10.1145/3029806.3029819},
  doi       = {10.1145/3029806.3029819},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/MalisaKC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MateticAKDSGJC17,
  author    = {Sinisa Matetic and
               Mansoor Ahmed and
               Kari Kostiainen and
               Aritra Dhar and
               David M. Sommer and
               Arthur Gervais and
               Ari Juels and
               Srdjan Capkun},
  title     = {{ROTE:} Rollback Protection for Trusted Execution},
  booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
               BC, Canada, August 16-18, 2017.},
  pages     = {1289--1306},
  year      = {2017},
  crossref  = {DBLP:conf/uss/2017},
  url       = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/matetic},
  timestamp = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/MateticAKDSGJC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/BrasserMDKCS17,
  author    = {Ferdinand Brasser and
               Urs M{\"{u}}ller and
               Alexandra Dmitrienko and
               Kari Kostiainen and
               Srdjan Capkun and
               Ahmad{-}Reza Sadeghi},
  title     = {Software Grand Exposure: {SGX} Cache Attacks Are Practical},
  booktitle = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
               BC, Canada, August 14-15, 2017.},
  year      = {2017},
  crossref  = {DBLP:conf/woot/2017},
  url       = {https://www.usenix.org/conference/woot17/workshop-program/presentation/brasser},
  timestamp = {Fri, 01 Sep 2017 12:31:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/woot/BrasserMDKCS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BrasserMDKCS17,
  author    = {Ferdinand Brasser and
               Urs M{\"{u}}ller and
               Alexandra Dmitrienko and
               Kari Kostiainen and
               Srdjan Capkun and
               Ahmad{-}Reza Sadeghi},
  title     = {Software Grand Exposure: {SGX} Cache Attacks Are Practical},
  journal   = {CoRR},
  volume    = {abs/1702.07521},
  year      = {2017},
  url       = {http://arxiv.org/abs/1702.07521},
  archivePrefix = {arXiv},
  eprint    = {1702.07521},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/BrasserMDKCS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-09917,
  author    = {Ferdinand Brasser and
               Srdjan Capkun and
               Alexandra Dmitrienko and
               Tommaso Frassetto and
               Kari Kostiainen and
               Urs M{\"{u}}ller and
               Ahmad{-}Reza Sadeghi},
  title     = {{DR.SGX:} Hardening {SGX} Enclaves against Cache Attacks with Data
               Location Randomization},
  journal   = {CoRR},
  volume    = {abs/1709.09917},
  year      = {2017},
  url       = {http://arxiv.org/abs/1709.09917},
  archivePrefix = {arXiv},
  eprint    = {1709.09917},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1709-09917},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MateticAKDSGJC17,
  author    = {Sinisa Matetic and
               Mansoor Ahmed and
               Kari Kostiainen and
               Aritra Dhar and
               David M. Sommer and
               Arthur Gervais and
               Ari Juels and
               Srdjan Capkun},
  title     = {{ROTE:} Rollback Protection for Trusted Execution},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {48},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/048},
  timestamp = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MateticAKDSGJC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalisaKKSC17,
  author    = {Luka Malisa and
               Kari Kostiainen and
               Thomas Knell and
               David M. Sommer and
               Srdjan Capkun},
  title     = {Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {584},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/584},
  timestamp = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MalisaKKSC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DharYKC17,
  author    = {Aritra Dhar and
               Der{-}Yeuan Yu and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {IntegriKey: End-to-End Integrity Protection of User Input},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1245},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1245},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DharYKC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MarforioMSKC16,
  author    = {Claudio Marforio and
               Ramya Jayaram Masti and
               Claudio Soriente and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {Hardened Setup of Personalized Security Indicators to Counter Phishing
               Attacks in Mobile Banking},
  booktitle = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones
               and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016},
  pages     = {83--92},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016spsm},
  url       = {http://dl.acm.org/citation.cfm?id=2994462},
  timestamp = {Tue, 06 Nov 2018 11:07:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/MarforioMSKC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/MarforioMSKC16,
  author    = {Claudio Marforio and
               Ramya Jayaram Masti and
               Claudio Soriente and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {Evaluation of Personalized Security Indicators as an Anti-Phishing
               Mechanism for Smartphone Applications},
  booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
               Systems, San Jose, CA, USA, May 7-12, 2016},
  pages     = {540--551},
  year      = {2016},
  crossref  = {DBLP:conf/chi/2016},
  url       = {https://doi.org/10.1145/2858036.2858085},
  doi       = {10.1145/2858036.2858085},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/MarforioMSKC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MalisaKOC16,
  author    = {Luka Malisa and
               Kari Kostiainen and
               Michael Och and
               Srdjan Capkun},
  title     = {Mobile Application Impersonation Detection Using Dynamic User Interface
               Extraction},
  booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
               in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
               Part {I}},
  pages     = {217--237},
  year      = {2016},
  crossref  = {DBLP:conf/esorics/2016-1},
  url       = {https://doi.org/10.1007/978-3-319-45744-4\_11},
  doi       = {10.1007/978-3-319-45744-4\_11},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/MalisaKOC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MalisaKKSC16,
  author    = {Luka Malisa and
               Kari Kostiainen and
               Thomas Knell and
               David M. Sommer and
               Srdjan Capkun},
  title     = {Hacking in the Blind: (Almost) Invisible Runtime {UI} Attacks on Safety-Critical
               Terminals},
  journal   = {CoRR},
  volume    = {abs/1604.04723},
  year      = {2016},
  url       = {http://arxiv.org/abs/1604.04723},
  archivePrefix = {arXiv},
  eprint    = {1604.04723},
  timestamp = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/MalisaKKSC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MastiMKSC15,
  author    = {Ramya Jayaram Masti and
               Claudio Marforio and
               Kari Kostiainen and
               Claudio Soriente and
               Srdjan Capkun},
  title     = {Logical Partitions on Many-Core Platforms},
  booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference,
               Los Angeles, CA, USA, December 7-11, 2015},
  pages     = {451--460},
  year      = {2015},
  crossref  = {DBLP:conf/acsac/2015},
  url       = {https://doi.org/10.1145/2818000.2818026},
  doi       = {10.1145/2818000.2818026},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/MastiMKSC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MarforioMSKC15,
  author    = {Claudio Marforio and
               Ramya Jayaram Masti and
               Claudio Soriente and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {Personalized Security Indicators to Detect Application Phishing Attacks
               in Mobile Platforms},
  journal   = {CoRR},
  volume    = {abs/1502.06824},
  year      = {2015},
  url       = {http://arxiv.org/abs/1502.06824},
  archivePrefix = {arXiv},
  eprint    = {1502.06824},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/MarforioMSKC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalisaKC15,
  author    = {Luka Malisa and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {Detecting Mobile Application Spoofing Attacks by Leveraging User Visual
               Similarity Perception},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {709},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/709},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MalisaKC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/EkbergKA14,
  author    = {Jan{-}Erik Ekberg and
               Kari Kostiainen and
               N. Asokan},
  title     = {The Untapped Potential of Trusted Execution Environments on Mobile
               Devices},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {12},
  number    = {4},
  pages     = {29--37},
  year      = {2014},
  url       = {https://doi.org/10.1109/MSP.2014.38},
  doi       = {10.1109/MSP.2014.38},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/EkbergKA14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/AsokanEKRRSSW14,
  author    = {N. Asokan and
               Jan{-}Erik Ekberg and
               Kari Kostiainen and
               Anand Rajan and
               Carlos V. Rozas and
               Ahmad{-}Reza Sadeghi and
               Steffen Schulz and
               Christian Wachsmann},
  title     = {Mobile Trusted Computing},
  journal   = {Proceedings of the {IEEE}},
  volume    = {102},
  number    = {8},
  pages     = {1189--1206},
  year      = {2014},
  url       = {https://doi.org/10.1109/JPROC.2014.2332007},
  doi       = {10.1109/JPROC.2014.2332007},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/pieee/AsokanEKRRSSW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MarforioKSKC14,
  author    = {Claudio Marforio and
               Nikolaos Karapanos and
               Claudio Soriente and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {Smartphones as Practical and Secure Location Verification Tokens for
               Payments},
  booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS}
               2014, San Diego, California, USA, February 23-26, 2014},
  year      = {2014},
  crossref  = {DBLP:conf/ndss/2014},
  url       = {https://www.ndss-symposium.org/ndss2014/smartphones-practical-and-secure-location-verification-tokens-payments},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/MarforioKSKC14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/synthesis/2013Asokan,
  author    = {N. Asokan and
               Lucas Vincenzo Davi and
               Alexandra Dmitrienko and
               Stephan Heuser and
               Kari Kostiainen and
               Elena Reshetova and
               Ahmad{-}Reza Sadeghi},
  title     = {Mobile Platform Security},
  series    = {Synthesis Lectures on Information Security, Privacy, and Trust},
  publisher = {Morgan {\&} Claypool Publishers},
  year      = {2013},
  url       = {https://doi.org/10.2200/S00555ED1V01Y201312SPT009},
  doi       = {10.2200/S00555ED1V01Y201312SPT009},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/series/synthesis/2013Asokan},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MarforioKSKC13,
  author    = {Claudio Marforio and
               Nikolaos Karapanos and
               Claudio Soriente and
               Kari Kostiainen and
               Srdjan Capkun},
  title     = {Secure enrollment and practical migration for mobile trusted execution
               environments},
  booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
               in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
               8, 2013, Berlin, Germany},
  pages     = {93--98},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013spsm},
  url       = {https://doi.org/10.1145/2516760.2516764},
  doi       = {10.1145/2516760.2516764},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/MarforioKSKC13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EkbergKA13,
  author    = {Jan{-}Erik Ekberg and
               Kari Kostiainen and
               N. Asokan},
  title     = {Trusted execution environments on mobile devices},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {1497--1498},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013},
  url       = {https://doi.org/10.1145/2508859.2516758},
  doi       = {10.1145/2508859.2516758},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/EkbergKA13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AsokanEK13,
  author    = {N. Asokan and
               Jan{-}Erik Ekberg and
               Kari Kostiainen},
  title     = {The Untapped Potential of Trusted Execution Environments on Mobile
               Devices},
  booktitle = {Financial Cryptography and Data Security - 17th International Conference,
               {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  pages     = {293--294},
  year      = {2013},
  crossref  = {DBLP:conf/fc/2013},
  url       = {https://doi.org/10.1007/978-3-642-39884-1\_24},
  doi       = {10.1007/978-3-642-39884-1\_24},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/AsokanEK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SaxenaEKA11,
  author    = {Nitesh Saxena and
               Jan{-}Erik Ekberg and
               Kari Kostiainen and
               N. Asokan},
  title     = {Secure Device Pairing Based on a Visual Channel: Design and Usability
               Study},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {6},
  number    = {1},
  pages     = {28--38},
  year      = {2011},
  url       = {https://doi.org/10.1109/TIFS.2010.2096217},
  doi       = {10.1109/TIFS.2010.2096217},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/SaxenaEKA11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KostiainenAA11,
  author    = {Kari Kostiainen and
               N. Asokan and
               Alexandra Afanasyeva},
  title     = {Towards User-Friendly Credential Transfer on Open Credential Platforms},
  booktitle = {Applied Cryptography and Network Security - 9th International Conference,
               {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  pages     = {395--412},
  year      = {2011},
  crossref  = {DBLP:conf/acns/2011},
  url       = {https://doi.org/10.1007/978-3-642-21554-4\_23},
  doi       = {10.1007/978-3-642-21554-4\_23},
  timestamp = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/KostiainenAA11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KostiainenA11,
  author    = {Kari Kostiainen and
               N. Asokan},
  title     = {Credential life cycle management in open credential platforms (short
               paper)},
  booktitle = {Proceedings of the sixth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011},
  pages     = {65--70},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011stc},
  url       = {https://doi.org/10.1145/2046582.2046595},
  doi       = {10.1145/2046582.2046595},
  timestamp = {Tue, 06 Nov 2018 11:07:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KostiainenA11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KostiainenREA11,
  author    = {Kari Kostiainen and
               Elena Reshetova and
               Jan{-}Erik Ekberg and
               N. Asokan},
  title     = {Old, new, borrowed, blue --: a perspective on the evolution of mobile
               platform security architectures},
  booktitle = {First {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages     = {13--24},
  year      = {2011},
  crossref  = {DBLP:conf/codaspy/2011},
  url       = {https://doi.org/10.1145/1943513.1943517},
  doi       = {10.1145/1943513.1943517},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/KostiainenREA11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KostiainenAE11,
  author    = {Kari Kostiainen and
               N. Asokan and
               Jan{-}Erik Ekberg},
  title     = {Practical Property-Based Attestation on Mobile Devices},
  booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
               2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  pages     = {78--92},
  year      = {2011},
  crossref  = {DBLP:conf/trust/2011},
  url       = {https://doi.org/10.1007/978-3-642-21599-5\_6},
  doi       = {10.1007/978-3-642-21599-5\_6},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/KostiainenAE11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SolisAKGO10,
  author    = {John Solis and
               N. Asokan and
               Kari Kostiainen and
               Philip Ginzboorg and
               J{\"{o}}rg Ott},
  title     = {Controlling resource hogs in mobile delay-tolerant networks},
  journal   = {Computer Communications},
  volume    = {33},
  number    = {1},
  pages     = {2--10},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.comcom.2009.07.019},
  doi       = {10.1016/j.comcom.2009.07.019},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/SolisAKGO10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BugielDKSW10,
  author    = {Sven Bugiel and
               Alexandra Dmitrienko and
               Kari Kostiainen and
               Ahmad{-}Reza Sadeghi and
               Marcel Winandy},
  title     = {TruWalletM: Secure Web Authentication on Mobile Platforms},
  booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010,
               Beijing, China, December 13-15, 2010, Revised Selected Papers},
  pages     = {219--236},
  year      = {2010},
  crossref  = {DBLP:conf/intrust/2010},
  url       = {https://doi.org/10.1007/978-3-642-25283-9\_15},
  doi       = {10.1007/978-3-642-25283-9\_15},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/intrust/BugielDKSW10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KostiainenAE10,
  author    = {Kari Kostiainen and
               N. Asokan and
               Jan{-}Erik Ekberg},
  title     = {Credential Disabling from Trusted Execution Environments},
  booktitle = {Information Security Technology for Applications - 15th Nordic Conference
               on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
               2010, Revised Selected Papers},
  pages     = {171--186},
  year      = {2010},
  crossref  = {DBLP:conf/nordsec/2010},
  url       = {https://doi.org/10.1007/978-3-642-27937-9\_12},
  doi       = {10.1007/978-3-642-27937-9\_12},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nordsec/KostiainenAE10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KostiainenDESA10,
  author    = {Kari Kostiainen and
               Alexandra Dmitrienko and
               Jan{-}Erik Ekberg and
               Ahmad{-}Reza Sadeghi and
               N. Asokan},
  title     = {Key Attestation from Trusted Execution Environments},
  booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
               2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  pages     = {30--46},
  year      = {2010},
  crossref  = {DBLP:conf/trust/2010},
  url       = {https://doi.org/10.1007/978-3-642-13869-0\_3},
  doi       = {10.1007/978-3-642-13869-0\_3},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/KostiainenDESA10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KostiainenEAR09,
  author    = {Kari Kostiainen and
               Jan{-}Erik Ekberg and
               N. Asokan and
               Aarne Rantala},
  title     = {On-board credentials with open provisioning},
  booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2009, Sydney, Australia, March
               10-12, 2009},
  pages     = {104--115},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009asia},
  url       = {https://doi.org/10.1145/1533057.1533074},
  doi       = {10.1145/1533057.1533074},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KostiainenEAR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EkbergAKR08,
  author    = {Jan{-}Erik Ekberg and
               N. Asokan and
               Kari Kostiainen and
               Aarne Rantala},
  title     = {Scheduling execution of credentials in constrained secure environments},
  booktitle = {Proceedings of the 3rd {ACM} Workshop on Scalable Trusted Computing,
               {STC} 2008, Alexandria, VA, USA, October 31, 2008},
  pages     = {61--70},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008stc},
  url       = {https://doi.org/10.1145/1456455.1456465},
  doi       = {10.1145/1456455.1456465},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/EkbergAKR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/KostiainenRMRHK07,
  author    = {Kari Kostiainen and
               Olli Rantapuska and
               Seamus Moloney and
               Virpi Roto and
               Ursula Holmstrom and
               Kristiina Karvonen},
  title     = {Usable Access Control inside Home Networks},
  booktitle = {2007 International Symposium on a World of Wireless, Mobile and Multimedia
               Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings},
  pages     = {1--6},
  year      = {2007},
  crossref  = {DBLP:conf/wowmom/2007},
  url       = {https://doi.org/10.1109/WOWMOM.2007.4351809},
  doi       = {10.1109/WOWMOM.2007.4351809},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wowmom/KostiainenRMRHK07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SaxenaEKA06,
  author    = {Nitesh Saxena and
               Jan{-}Erik Ekberg and
               Kari Kostiainen and
               N. Asokan},
  title     = {Secure Device Pairing based on a Visual Channel (Short Paper)},
  booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
               May 2006, Berkeley, California, {USA}},
  pages     = {306--313},
  year      = {2006},
  crossref  = {DBLP:conf/sp/2006},
  url       = {https://doi.org/10.1109/SP.2006.35},
  doi       = {10.1109/SP.2006.35},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/SaxenaEKA06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaxenaEKA06,
  author    = {Nitesh Saxena and
               Jan{-}Erik Ekberg and
               Kari Kostiainen and
               N. Asokan},
  title     = {Secure Device Pairing based on a Visual Channel},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {50},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/050},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SaxenaEKA06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ism/AsokanMGK05,
  author    = {N. Asokan and
               Seamus Moloney and
               Philip Ginzboorg and
               Kari Kostiainen},
  title     = {Visitor Access Management in Personal Wireless Networks},
  booktitle = {Seventh {IEEE} International Symposium on Multimedia {(ISM} 2005),
               12-14 December 2005, Irvine, CA, {USA}},
  pages     = {686--694},
  year      = {2005},
  crossref  = {DBLP:conf/ism/2005},
  url       = {https://doi.org/10.1109/ISM.2005.122},
  doi       = {10.1109/ISM.2005.122},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ism/AsokanMGK05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2019,
  editor    = {Ian Goldberg and
               Tyler Moore},
  title     = {Financial Cryptography and Data Security - 23rd International Conference,
               {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
               Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11598},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-32101-7},
  doi       = {10.1007/978-3-030-32101-7},
  isbn      = {978-3-030-32100-0},
  timestamp = {Mon, 14 Oct 2019 14:51:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2019,
  editor    = {Nadia Heninger and
               Patrick Traynor},
  title     = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
               CA, USA, August 14-16, 2019},
  publisher = {{USENIX} Association},
  year      = {2019},
  url       = {https://www.usenix.org/conference/usenixsecurity19},
  timestamp = {Tue, 03 Sep 2019 16:37:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2017,
  editor    = {Wieland Fischer and
               Naofumi Homma},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
               Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10529},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-66787-4},
  doi       = {10.1007/978-3-319-66787-4},
  isbn      = {978-3-319-66786-7},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017,
  editor    = {Gail{-}Joon Ahn and
               Alexander Pretschner and
               Gabriel Ghinita},
  title     = {Proceedings of the Seventh {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3029806},
  isbn      = {978-1-4503-4523-1},
  timestamp = {Sat, 18 Mar 2017 19:19:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2017,
  editor    = {Engin Kirda and
               Thomas Ristenpart},
  title     = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
               BC, Canada, August 16-18, 2017},
  publisher = {{USENIX} Association},
  year      = {2017},
  url       = {https://www.usenix.org/conference/usenixsecurity17},
  timestamp = {Fri, 01 Sep 2017 12:24:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/woot/2017,
  editor    = {William Enck and
               Collin Mulliner},
  title     = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
               BC, Canada, August 14-15, 2017},
  publisher = {{USENIX} Association},
  year      = {2017},
  url       = {https://www.usenix.org/conference/woot17},
  timestamp = {Fri, 01 Sep 2017 12:31:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/woot/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016spsm,
  editor    = {Long Lu and
               Mohammad Mannan},
  title     = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones
               and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2994459},
  doi       = {10.1145/2994459},
  isbn      = {978-1-4503-4564-4},
  timestamp = {Tue, 06 Nov 2018 11:07:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016spsm},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2016,
  editor    = {Jofish Kaye and
               Allison Druin and
               Cliff Lampe and
               Dan Morris and
               Juan Pablo Hourcade},
  title     = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
               Systems, San Jose, CA, USA, May 7-12, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2858036},
  isbn      = {978-1-4503-3362-7},
  timestamp = {Sun, 08 May 2016 11:21:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chi/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016-1,
  editor    = {Ioannis G. Askoxylakis and
               Sotiris Ioannidis and
               Sokratis K. Katsikas and
               Catherine A. Meadows},
  title     = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
               in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9878},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45744-4},
  doi       = {10.1007/978-3-319-45744-4},
  isbn      = {978-3-319-45743-7},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2015,
  title     = {Proceedings of the 31st Annual Computer Security Applications Conference,
               Los Angeles, CA, USA, December 7-11, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2818000},
  isbn      = {978-1-4503-3682-6},
  timestamp = {Tue, 15 Dec 2015 16:27:33 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2014,
  title     = {21st Annual Network and Distributed System Security Symposium, {NDSS}
               2014, San Diego, California, USA, February 23-26, 2014},
  publisher = {The Internet Society},
  year      = {2014},
  url       = {https://www.ndss-symposium.org/ndss2014/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013spsm,
  editor    = {William Enck and
               Adrienne Porter Felt and
               N. Asokan},
  title     = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
               in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
               8, 2013, Berlin, Germany},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2516760},
  isbn      = {978-1-4503-2491-5},
  timestamp = {Fri, 31 Jan 2014 10:49:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013spsm},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2508859},
  isbn      = {978-1-4503-2477-9},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2013,
  editor    = {Ahmad{-}Reza Sadeghi},
  title     = {Financial Cryptography and Data Security - 17th International Conference,
               {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7859},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39884-1},
  doi       = {10.1007/978-3-642-39884-1},
  isbn      = {978-3-642-39883-4},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2011,
  editor    = {Javier L{\'{o}}pez and
               Gene Tsudik},
  title     = {Applied Cryptography and Network Security - 9th International Conference,
               {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6715},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21554-4},
  doi       = {10.1007/978-3-642-21554-4},
  isbn      = {978-3-642-21553-7},
  timestamp = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011stc,
  editor    = {Yan Chen and
               Shouhuai Xu and
               Ahmad{-}Reza Sadeghi and
               Xinwen Zhang},
  title     = {Proceedings of the sixth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/2046582},
  doi       = {10.1145/2046582},
  isbn      = {978-1-4503-1001-7},
  timestamp = {Tue, 06 Nov 2018 11:07:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011stc},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2011,
  editor    = {Ravi S. Sandhu and
               Elisa Bertino},
  title     = {First {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0466-5},
  timestamp = {Tue, 07 Jun 2011 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2011,
  editor    = {Jonathan M. McCune and
               Boris Balacheff and
               Adrian Perrig and
               Ahmad{-}Reza Sadeghi and
               M. Angela Sasse and
               Yolanta Beres},
  title     = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
               2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6740},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21599-5},
  doi       = {10.1007/978-3-642-21599-5},
  isbn      = {978-3-642-21598-8},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2010,
  editor    = {Liqun Chen and
               Moti Yung},
  title     = {Trusted Systems - Second International Conference, {INTRUST} 2010,
               Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6802},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25283-9},
  doi       = {10.1007/978-3-642-25283-9},
  isbn      = {978-3-642-25282-2},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/intrust/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2010,
  editor    = {Tuomas Aura and
               Kimmo J{\"{a}}rvinen and
               Kaisa Nyberg},
  title     = {Information Security Technology for Applications - 15th Nordic Conference
               on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
               2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7127},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-27937-9},
  doi       = {10.1007/978-3-642-27937-9},
  isbn      = {978-3-642-27936-2},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nordsec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2010,
  editor    = {Alessandro Acquisti and
               Sean W. Smith and
               Ahmad{-}Reza Sadeghi},
  title     = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
               2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6101},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13869-0},
  doi       = {10.1007/978-3-642-13869-0},
  isbn      = {978-3-642-13868-3},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009asia,
  editor    = {Wanqing Li and
               Willy Susilo and
               Udaya Kiran Tupakula and
               Reihaneh Safavi{-}Naini and
               Vijay Varadharajan},
  title     = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2009, Sydney, Australia, March
               10-12, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-394-5},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2009asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008stc,
  editor    = {Shouhuai Xu and
               Cristina Nita{-}Rotaru and
               Jean{-}Pierre Seifert},
  title     = {Proceedings of the 3rd {ACM} Workshop on Scalable Trusted Computing,
               {STC} 2008, Alexandria, VA, USA, October 31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-295-5},
  timestamp = {Tue, 11 Nov 2008 13:11:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2008stc},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wowmom/2007,
  title     = {2007 International Symposium on a World of Wireless, Mobile and Multimedia
               Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4351671/proceeding},
  isbn      = {1-4244-0992-6},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wowmom/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2006,
  title     = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
               May 2006, Berkeley, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/10812/proceeding},
  isbn      = {0-7695-2574-1},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ism/2005,
  title     = {Seventh {IEEE} International Symposium on Multimedia {(ISM} 2005),
               12-14 December 2005, Irvine, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/10471/proceeding},
  isbn      = {0-7695-2489-3},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ism/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics