Trust and Trustworthy Computing最新文献

筛选
英文 中文
Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness 传感器验证码:仪器硬件传感器的可用性以证明其活动性
Trust and Trustworthy Computing Pub Date : 2016-08-29 DOI: 10.1007/978-3-319-45572-3_3
Thomas Hupperich, Katharina Krombholz, Thorsten Holz
{"title":"Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness","authors":"Thomas Hupperich, Katharina Krombholz, Thorsten Holz","doi":"10.1007/978-3-319-45572-3_3","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_3","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130388838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited 再论强Diffie Hellman假设下的匿名证明
Trust and Trustworthy Computing Pub Date : 2016-08-29 DOI: 10.1007/978-3-319-45572-3_1
J. Camenisch, Manu Drijvers, Anja Lehmann
{"title":"Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited","authors":"J. Camenisch, Manu Drijvers, Anja Lehmann","doi":"10.1007/978-3-319-45572-3_1","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_1","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133829958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Enabling Key Migration Between Non-compatible TPM Versions 使能在不兼容的TPM版本之间进行密钥迁移
Trust and Trustworthy Computing Pub Date : 2016-08-29 DOI: 10.1007/978-3-319-45572-3_6
Linus Karlsson, Martin Hell
{"title":"Enabling Key Migration Between Non-compatible TPM Versions","authors":"Linus Karlsson, Martin Hell","doi":"10.1007/978-3-319-45572-3_6","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_6","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical Signing-Right Revocation 实际签字——权利撤销
Trust and Trustworthy Computing Pub Date : 2016-08-29 DOI: 10.1007/978-3-319-45572-3_2
Michael Till Beck, S. Krenn, Franz-Stefan Preiss, Kai Samelin
{"title":"Practical Signing-Right Revocation","authors":"Michael Till Beck, S. Krenn, Franz-Stefan Preiss, Kai Samelin","doi":"10.1007/978-3-319-45572-3_2","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_2","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bundling Evidence for Layered Attestation 分层证明的捆绑证据
Trust and Trustworthy Computing Pub Date : 2016-08-29 DOI: 10.1007/978-3-319-45572-3_7
Paul D. Rowe
{"title":"Bundling Evidence for Layered Attestation","authors":"Paul D. Rowe","doi":"10.1007/978-3-319-45572-3_7","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_7","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122315032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Controversy in Trust Networks 信任网络的争议
Trust and Trustworthy Computing Pub Date : 2016-08-29 DOI: 10.1007/978-3-319-45572-3_5
P. Zicari, R. Interdonato, D. Perna, Andrea Tagarelli, S. Greco
{"title":"Controversy in Trust Networks","authors":"P. Zicari, R. Interdonato, D. Perna, Andrea Tagarelli, S. Greco","doi":"10.1007/978-3-319-45572-3_5","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_5","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131959475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices 在轻量级嵌入式设备上进行漏洞缓解的运行时完整性检查
Trust and Trustworthy Computing Pub Date : 2016-08-29 DOI: 10.1007/978-3-319-45572-3_4
M. Neugschwandtner, Collin Mulliner, William K. Robertson, E. Kirda
{"title":"Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices","authors":"M. Neugschwandtner, Collin Mulliner, William K. Robertson, E. Kirda","doi":"10.1007/978-3-319-45572-3_4","DOIUrl":"https://doi.org/10.1007/978-3-319-45572-3_4","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115385995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computing Trust Levels Based on User's Personality and Observed System Trustworthiness 基于用户个性和观察系统可信度的信任水平计算
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_5
Michalis Kanakakis, S. V. D. Graaf, Costas Kalogiros, W. Vanobberghen
{"title":"Computing Trust Levels Based on User's Personality and Observed System Trustworthiness","authors":"Michalis Kanakakis, S. V. D. Graaf, Costas Kalogiros, W. Vanobberghen","doi":"10.1007/978-3-319-22846-4_5","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_5","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115371925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trustworthy Memory Isolation of Linux on Embedded Devices 嵌入式设备上Linux的可信内存隔离
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_8
Hamed Nemati, M. Dam, R. Guanciale, Viktor Do, A. Vahidi
{"title":"Trustworthy Memory Isolation of Linux on Embedded Devices","authors":"Hamed Nemati, M. Dam, R. Guanciale, Viktor Do, A. Vahidi","doi":"10.1007/978-3-319-22846-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_8","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PUF-Based Software Protection for Low-End Embedded Devices 基于puf的低端嵌入式设备软件保护
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_1
Florian Kohnhäuser, André Schaller, S. Katzenbeisser
{"title":"PUF-Based Software Protection for Low-End Embedded Devices","authors":"Florian Kohnhäuser, André Schaller, S. Katzenbeisser","doi":"10.1007/978-3-319-22846-4_1","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_1","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130352865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信