Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/trust/trust2012.bht:"
@inproceedings{DBLP:conf/trust/CaiC12, author = {Liang Cai and Hao Chen}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {On the Practicality of Motion Based Keystroke Inference Attack}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {273--290}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_16}, doi = {10.1007/978-3-642-30921-2\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/CaiC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ChengD12, author = {Yueqiang Cheng and Xuhua Ding}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Virtualization Based Password Protection against Malware in Untrusted Operating Systems}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {201--218}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_12}, doi = {10.1007/978-3-642-30921-2\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/ChengD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/CristofaroT12, author = {Emiliano De Cristofaro and Gene Tsudik}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Experimenting with Fast Private Set Intersection}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {55--73}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_4}, doi = {10.1007/978-3-642-30921-2\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/CristofaroT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/DmitrienkoSTW12, author = {Alexandra Dmitrienko and Ahmad{-}Reza Sadeghi and Sandeep Tamrakar and Christian Wachsmann}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {SmartTokens: Delegable Access Control with NFC-Enabled Smartphones}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {219--238}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_13}, doi = {10.1007/978-3-642-30921-2\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/DmitrienkoSTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/EkbergAA12, author = {Jan{-}Erik Ekberg and Alexandra Afanasyeva and N. Asokan}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Authenticated Encryption Primitives for Size-Constrained Trusted Computing}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {1--18}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_1}, doi = {10.1007/978-3-642-30921-2\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/EkbergAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/GiblerCEC12, author = {Clint Gibler and Jonathan Crussell and Jeremy Erickson and Hao Chen}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {291--307}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_17}, doi = {10.1007/978-3-642-30921-2\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/GiblerCEC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HasanKT12, author = {Zahid Hasan and Alina Krischkowsky and Manfred Tscheligi}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Modelling User-Centered-Trust {(UCT)} in Software Systems: Interplay of Trust, Affect and Acceptance Model}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {92--109}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_6}, doi = {10.1007/978-3-642-30921-2\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HasanKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KirlapposSH12, author = {Iacovos Kirlappos and Martina Angela Sasse and Nigel Harvey}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Why Trust Seals Don't Work: {A} Study of User Perceptions and Behavior}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {308--324}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_18}, doi = {10.1007/978-3-642-30921-2\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KirlapposSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/KocabasPKS12, author = {{\"{U}}nal Ko{\c{c}}abas and Andreas Peter and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Converse PUF-Based Authentication}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {142--158}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_9}, doi = {10.1007/978-3-642-30921-2\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/KocabasPKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Kumar12, author = {Apurva Kumar}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {A Belief Logic for Analyzing Security of Web Protocols}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {239--254}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_14}, doi = {10.1007/978-3-642-30921-2\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Kumar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Murphy12, author = {Julian P. Murphy}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Clockless Physical Unclonable Functions}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {110--121}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_7}, doi = {10.1007/978-3-642-30921-2\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Murphy12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/NamilukoM12, author = {Cornelius Namiluko and Andrew P. Martin}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Provenance-Based Model for Verifying Trust-Properties}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {255--272}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_15}, doi = {10.1007/978-3-642-30921-2\_15}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/NamilukoM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/PirkerWT12, author = {Martin Pirker and Johannes Winter and Ronald Toegl}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Lightweight Distributed Heterogeneous Attested Android Clouds}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {122--141}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_8}, doi = {10.1007/978-3-642-30921-2\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/PirkerWT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SangorrinHT12, author = {Daniel Sangorr{\'{\i}}n and Shinya Honda and Hiroaki Takada}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {74--91}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_5}, doi = {10.1007/978-3-642-30921-2\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SangorrinHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SchiffmanVJ12, author = {Joshua Schiffman and Hayawardh Vijayakumar and Trent Jaeger}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Verifying System Integrity by Proxy}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {179--200}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_11}, doi = {10.1007/978-3-642-30921-2\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SchiffmanVJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SmartR12, author = {Matt Smart and Eike Ritter}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {19--33}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_2}, doi = {10.1007/978-3-642-30921-2\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SmartR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VasudevanOZNM12, author = {Amit Vasudevan and Emmanuel Owusu and Zongwei Zhou and James Newsome and Jonathan M. McCune}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {159--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_10}, doi = {10.1007/978-3-642-30921-2\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/VasudevanOZNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VasudevanPQGP12, author = {Amit Vasudevan and Bryan Parno and Ning Qu and Virgil D. Gligor and Adrian Perrig}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {34--54}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_3}, doi = {10.1007/978-3-642-30921-2\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/VasudevanPQGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZhengSXZ12, author = {Saijing Zheng and Pan Shi and Heng Xu and Cheng Zhang}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {325--339}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_19}, doi = {10.1007/978-3-642-30921-2\_19}, timestamp = {Sat, 18 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZhengSXZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2012, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2}, doi = {10.1007/978-3-642-30921-2}, isbn = {978-3-642-30920-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.