Trust and Trustworthy Computing最新文献

筛选
英文 中文
DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone DAA- tz:基于ARM TrustZone的高效移动设备DAA方案
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_13
Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, D. Feng
{"title":"DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone","authors":"Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, D. Feng","doi":"10.1007/978-3-319-22846-4_13","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_13","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122665834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness PassSec的设计和现场评估:提高和维持网络冲浪者的风险意识
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_7
M. Volkamer, K. Renaud, Gamze Canova, B. Reinheimer, Kristoffer Braun
{"title":"Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness","authors":"M. Volkamer, K. Renaud, Gamze Canova, B. Reinheimer, Kristoffer Braun","doi":"10.1007/978-3-319-22846-4_7","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_7","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129459262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Secure Erasure and Code Update in Legacy Sensors 传统传感器中的安全擦除和代码更新
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_17
Ghassan O. Karame, Wenting Li
{"title":"Secure Erasure and Code Update in Legacy Sensors","authors":"Ghassan O. Karame, Wenting Li","doi":"10.1007/978-3-319-22846-4_17","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_17","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133252903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Time to Rethink: Trust Brokerage Using Trusted Execution Environments 是时候重新思考:使用可信执行环境的信托经纪
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_11
Patrick Koeberl, Vinay Phegade, Anand Rajan, T. Schneider, Steffen Schulz, M. Zhdanova
{"title":"Time to Rethink: Trust Brokerage Using Trusted Execution Environments","authors":"Patrick Koeberl, Vinay Phegade, Anand Rajan, T. Schneider, Steffen Schulz, M. Zhdanova","doi":"10.1007/978-3-319-22846-4_11","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_11","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"108 48","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120825615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection 提议的处理器扩展显著加速Hypervisor内存自省
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_15
Andrei V. Lutas, Sándor Lukács, Adrian Colesa, Dan H. Lutas
{"title":"Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection","authors":"Andrei V. Lutas, Sándor Lukács, Adrian Colesa, Dan H. Lutas","doi":"10.1007/978-3-319-22846-4_15","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_15","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130258064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering 通过智能投票过滤提高按需服务系统的可信度
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_6
Christos V. Samaras, A. Tsioliaridou, C. Liaskos, D. Spiliotopoulos, S. Ioannidis
{"title":"Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering","authors":"Christos V. Samaras, A. Tsioliaridou, C. Liaskos, D. Spiliotopoulos, S. Ioannidis","doi":"10.1007/978-3-319-22846-4_6","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_6","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116489915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks REWIRE——无解决的撤销:一种对车辆自组织网络隐私友好的撤销机制
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_12
David Förster, Hans Löhr, Jan Zibuschka, F. Kargl
{"title":"REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks","authors":"David Förster, Hans Löhr, Jan Zibuschka, F. Kargl","doi":"10.1007/978-3-319-22846-4_12","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_12","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115372326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography 基于MWA倾斜SRAM的公钥物理加密的SIMPL系统
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_16
Qingqing Chen, U. Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann
{"title":"MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography","authors":"Qingqing Chen, U. Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann","doi":"10.1007/978-3-319-22846-4_16","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_16","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127279663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Why Attackers Win: On the Learnability of XOR Arbiter PUFs 为什么攻击者会赢:关于XOR仲裁者puf的易学性
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_2
F. Ganji, Shahin Tajik, Jean-Pierre Seifert
{"title":"Why Attackers Win: On the Learnability of XOR Arbiter PUFs","authors":"F. Ganji, Shahin Tajik, Jean-Pierre Seifert","doi":"10.1007/978-3-319-22846-4_2","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_2","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128672799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
DAA-A: Direct Anonymous Attestation with Attributes daa:带属性的直接匿名认证
Trust and Trustworthy Computing Pub Date : 2015-08-24 DOI: 10.1007/978-3-319-22846-4_14
Liqun Chen, Rainer Urian
{"title":"DAA-A: Direct Anonymous Attestation with Attributes","authors":"Liqun Chen, Rainer Urian","doi":"10.1007/978-3-319-22846-4_14","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_14","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114303782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信