Search dblp for Publications

export results for "toc:db/conf/trust/trust2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/trust/CaiC12,
  author       = {Liang Cai and
                  Hao Chen},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {On the Practicality of Motion Based Keystroke Inference Attack},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {273--290},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_16},
  doi          = {10.1007/978-3-642-30921-2\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/CaiC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ChengD12,
  author       = {Yueqiang Cheng and
                  Xuhua Ding},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Virtualization Based Password Protection against Malware in Untrusted
                  Operating Systems},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_12},
  doi          = {10.1007/978-3-642-30921-2\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/ChengD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/CristofaroT12,
  author       = {Emiliano De Cristofaro and
                  Gene Tsudik},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Experimenting with Fast Private Set Intersection},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_4},
  doi          = {10.1007/978-3-642-30921-2\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/CristofaroT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/DmitrienkoSTW12,
  author       = {Alexandra Dmitrienko and
                  Ahmad{-}Reza Sadeghi and
                  Sandeep Tamrakar and
                  Christian Wachsmann},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {SmartTokens: Delegable Access Control with NFC-Enabled Smartphones},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {219--238},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_13},
  doi          = {10.1007/978-3-642-30921-2\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/DmitrienkoSTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/EkbergAA12,
  author       = {Jan{-}Erik Ekberg and
                  Alexandra Afanasyeva and
                  N. Asokan},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Authenticated Encryption Primitives for Size-Constrained Trusted Computing},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_1},
  doi          = {10.1007/978-3-642-30921-2\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/EkbergAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/GiblerCEC12,
  author       = {Clint Gibler and
                  Jonathan Crussell and
                  Jeremy Erickson and
                  Hao Chen},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android
                  Applications on a Large Scale},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {291--307},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_17},
  doi          = {10.1007/978-3-642-30921-2\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/GiblerCEC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HasanKT12,
  author       = {Zahid Hasan and
                  Alina Krischkowsky and
                  Manfred Tscheligi},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Modelling User-Centered-Trust {(UCT)} in Software Systems: Interplay
                  of Trust, Affect and Acceptance Model},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {92--109},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_6},
  doi          = {10.1007/978-3-642-30921-2\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HasanKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KirlapposSH12,
  author       = {Iacovos Kirlappos and
                  Martina Angela Sasse and
                  Nigel Harvey},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Why Trust Seals Don't Work: {A} Study of User Perceptions and Behavior},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {308--324},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_18},
  doi          = {10.1007/978-3-642-30921-2\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KirlapposSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KocabasPKS12,
  author       = {{\"{U}}nal Ko{\c{c}}abas and
                  Andreas Peter and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Converse PUF-Based Authentication},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {142--158},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_9},
  doi          = {10.1007/978-3-642-30921-2\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KocabasPKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Kumar12,
  author       = {Apurva Kumar},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {A Belief Logic for Analyzing Security of Web Protocols},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {239--254},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_14},
  doi          = {10.1007/978-3-642-30921-2\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Kumar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Murphy12,
  author       = {Julian P. Murphy},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Clockless Physical Unclonable Functions},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {110--121},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_7},
  doi          = {10.1007/978-3-642-30921-2\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Murphy12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NamilukoM12,
  author       = {Cornelius Namiluko and
                  Andrew P. Martin},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Provenance-Based Model for Verifying Trust-Properties},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {255--272},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_15},
  doi          = {10.1007/978-3-642-30921-2\_15},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/NamilukoM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/PirkerWT12,
  author       = {Martin Pirker and
                  Johannes Winter and
                  Ronald Toegl},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Lightweight Distributed Heterogeneous Attested Android Clouds},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {122--141},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_8},
  doi          = {10.1007/978-3-642-30921-2\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/PirkerWT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SangorrinHT12,
  author       = {Daniel Sangorr{\'{\i}}n and
                  Shinya Honda and
                  Hiroaki Takada},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {74--91},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_5},
  doi          = {10.1007/978-3-642-30921-2\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SangorrinHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SchiffmanVJ12,
  author       = {Joshua Schiffman and
                  Hayawardh Vijayakumar and
                  Trent Jaeger},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Verifying System Integrity by Proxy},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {179--200},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_11},
  doi          = {10.1007/978-3-642-30921-2\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SchiffmanVJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SmartR12,
  author       = {Matt Smart and
                  Eike Ritter},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_2},
  doi          = {10.1007/978-3-642-30921-2\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SmartR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VasudevanOZNM12,
  author       = {Amit Vasudevan and
                  Emmanuel Owusu and
                  Zongwei Zhou and
                  James Newsome and
                  Jonathan M. McCune},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Trustworthy Execution on Mobile Devices: What Security Properties
                  Can My Mobile Platform Give Me?},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_10},
  doi          = {10.1007/978-3-642-30921-2\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/VasudevanOZNM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VasudevanPQGP12,
  author       = {Amit Vasudevan and
                  Bryan Parno and
                  Ning Qu and
                  Virgil D. Gligor and
                  Adrian Perrig},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Lockdown: Towards a Safe and Practical Architecture for Security Applications
                  on Commodity Platforms},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {34--54},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_3},
  doi          = {10.1007/978-3-642-30921-2\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/VasudevanPQGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhengSXZ12,
  author       = {Saijing Zheng and
                  Pan Shi and
                  Heng Xu and
                  Cheng Zhang},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Launching the New Profile on Facebook: Understanding the Triggers
                  and Outcomes of Users' Privacy Concerns},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {325--339},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_19},
  doi          = {10.1007/978-3-642-30921-2\_19},
  timestamp    = {Sat, 18 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZhengSXZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2012,
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2},
  doi          = {10.1007/978-3-642-30921-2},
  isbn         = {978-3-642-30920-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics