Thomas Hupperich, Katharina Krombholz, Thorsten Holz
{"title":"Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness","authors":"Thomas Hupperich, Katharina Krombholz, Thorsten Holz","doi":"10.1007/978-3-319-45572-3_3","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_3","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130388838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited","authors":"J. Camenisch, Manu Drijvers, Anja Lehmann","doi":"10.1007/978-3-319-45572-3_1","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_1","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133829958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling Key Migration Between Non-compatible TPM Versions","authors":"Linus Karlsson, Martin Hell","doi":"10.1007/978-3-319-45572-3_6","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_6","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Till Beck, S. Krenn, Franz-Stefan Preiss, Kai Samelin
{"title":"Practical Signing-Right Revocation","authors":"Michael Till Beck, S. Krenn, Franz-Stefan Preiss, Kai Samelin","doi":"10.1007/978-3-319-45572-3_2","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_2","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bundling Evidence for Layered Attestation","authors":"Paul D. Rowe","doi":"10.1007/978-3-319-45572-3_7","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_7","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122315032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Zicari, R. Interdonato, D. Perna, Andrea Tagarelli, S. Greco
{"title":"Controversy in Trust Networks","authors":"P. Zicari, R. Interdonato, D. Perna, Andrea Tagarelli, S. Greco","doi":"10.1007/978-3-319-45572-3_5","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_5","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131959475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Neugschwandtner, Collin Mulliner, William K. Robertson, E. Kirda
{"title":"Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices","authors":"M. Neugschwandtner, Collin Mulliner, William K. Robertson, E. Kirda","doi":"10.1007/978-3-319-45572-3_4","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_4","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115385995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michalis Kanakakis, S. V. D. Graaf, Costas Kalogiros, W. Vanobberghen
{"title":"Computing Trust Levels Based on User's Personality and Observed System Trustworthiness","authors":"Michalis Kanakakis, S. V. D. Graaf, Costas Kalogiros, W. Vanobberghen","doi":"10.1007/978-3-319-22846-4_5","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_5","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115371925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamed Nemati, M. Dam, R. Guanciale, Viktor Do, A. Vahidi
{"title":"Trustworthy Memory Isolation of Linux on Embedded Devices","authors":"Hamed Nemati, M. Dam, R. Guanciale, Viktor Do, A. Vahidi","doi":"10.1007/978-3-319-22846-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_8","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Florian Kohnhäuser, André Schaller, S. Katzenbeisser
{"title":"PUF-Based Software Protection for Low-End Embedded Devices","authors":"Florian Kohnhäuser, André Schaller, S. Katzenbeisser","doi":"10.1007/978-3-319-22846-4_1","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_1","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130352865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}