Vai al contenuto principale della pagina

Trust and trustworthy computing : 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings / Stefan Katzenbeisser [and others] (eds.).



(Visualizza formato Marc21)    (visualizza in BIBRAME 2.0)

Creatore: TRUST (Conference) (5th : 2012 : Vienna, Austria)
Titolo: Trust and trustworthy computing : 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings / Stefan Katzenbeisser [and others] (eds.).
Link to work: Trust and trustworthy computing Visualizza cluster
Pubblicazione: Berlin ; New York : Springer, ©2012
Estensione: 1 online resource.
Tipo formato: computer
Tipo contenuto: text
Tipo supporto: online resource
Disciplina: 005.8
Titolo uniforme di collana: Lecture notes in computer science ; 7344.
LNCS sublibrary. SL 4, Security and cryptology.
Genere/Forma: Electronic books
Conference papers and proceedings
Index term-Uncontrolled: Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
Soggetto non controllato: Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
Termine d'indicizzazione-Occupazione: Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
Classificazione LOC: QA76.9.A25 T78 2012
Creatori/Collaboratori: Katzenbeisser, Stefan
Contenuto supplementare: Includes bibliographical references and author index.
Nota di contenuto: Authenticated Encryption Primitives for Size-Constrained Trusted Computing / Jan-Erik Ekberg, Alexandra Afanasyeva and N. Asokan -- Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing / Matt Smart and Eike Ritter -- Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms / Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor and Adrian Perrig -- Experimenting with Fast Private Set Intersection / Emiliano De Cristofaro and Gene Tsudik -- Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing / Daniel Sangorrín, Shinya Honda and Hiroaki Takada -- Modelling User-Centered-Trust (UCT) in Software Systems: Interplay of Trust, Affect and Acceptance Model / Zahid Hasan, Alina Krischkowsky and Manfred Tscheligi -- Clockless Physical Unclonable Functions / Julian Murphy -- Lightweight Distributed Heterogeneous Attested Android Clouds / Martin Pirker, Johannes Winter and Ronald Toegl -- Converse PUF-Based Authentication / Ünal Kocabaş, Andreas Peter, Stefan Katzenbeisser and Ahmad-Reza Sadeghi -- Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? / Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome and Jonathan M. McCune -- Verifying System Integrity by Proxy / Joshua Schiffman, Hayawardh Vijayakumar and Trent Jaeger -- Virtualization Based Password Protection against Malware in Untrusted Operating Systems / Yueqiang Cheng and Xuhua Ding -- SmartTokens: Delegable Access Control with NFC-Enabled Smartphones / Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar and Christian Wachsmann -- A Belief Logic for Analyzing Security of Web Protocols / Apurva Kumar -- Provenance-Based Model for Verifying Trust-Properties / Cornelius Namiluko and Andrew Martin -- On the Practicality of Motion Based Keystroke Inference Attack / Liang Cai and Hao Chen -- AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale / Clint Gibler, Jonathan Crussell, Jeremy Erickson and Hao Chen -- Why Trust Seals Don't Work: A Study of User Perceptions and Behavior / Iacovos Kirlappos, M. Angela Sasse and Nigel Harvey -- Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns / Saijing Zheng, Pan Shi, Heng Xu and Cheng Zhang.
Restrizioni accesso: Access is restricted to users affiliated with licensed institutions.
Sommario/riassunto: This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
Collana: Lecture notes in computer science, 0302-9743 ; 7344
LNCS sublibrary. SL 4, Security and cryptology
Varianti del titolo: TRUST 2012
ISBN: 9783642309212
3642309216
9783642309205
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 004623199
Localizzazioni e accesso elettronico https://ebookcentral.proquest.com/lib/nyulibrary-ebooks/detail.action?docID=3071051
Collocazione: Electronic access
Lo trovi qui: New York University
Altra ed. diverso supporto: Printed edition: 9783642309205