Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, D. Feng
{"title":"DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone","authors":"Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, D. Feng","doi":"10.1007/978-3-319-22846-4_13","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_13","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122665834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Volkamer, K. Renaud, Gamze Canova, B. Reinheimer, Kristoffer Braun
{"title":"Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness","authors":"M. Volkamer, K. Renaud, Gamze Canova, B. Reinheimer, Kristoffer Braun","doi":"10.1007/978-3-319-22846-4_7","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_7","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129459262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Erasure and Code Update in Legacy Sensors","authors":"Ghassan O. Karame, Wenting Li","doi":"10.1007/978-3-319-22846-4_17","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_17","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133252903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patrick Koeberl, Vinay Phegade, Anand Rajan, T. Schneider, Steffen Schulz, M. Zhdanova
{"title":"Time to Rethink: Trust Brokerage Using Trusted Execution Environments","authors":"Patrick Koeberl, Vinay Phegade, Anand Rajan, T. Schneider, Steffen Schulz, M. Zhdanova","doi":"10.1007/978-3-319-22846-4_11","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_11","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"108 48","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120825615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrei V. Lutas, Sándor Lukács, Adrian Colesa, Dan H. Lutas
{"title":"Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection","authors":"Andrei V. Lutas, Sándor Lukács, Adrian Colesa, Dan H. Lutas","doi":"10.1007/978-3-319-22846-4_15","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_15","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130258064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christos V. Samaras, A. Tsioliaridou, C. Liaskos, D. Spiliotopoulos, S. Ioannidis
{"title":"Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering","authors":"Christos V. Samaras, A. Tsioliaridou, C. Liaskos, D. Spiliotopoulos, S. Ioannidis","doi":"10.1007/978-3-319-22846-4_6","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_6","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116489915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks","authors":"David Förster, Hans Löhr, Jan Zibuschka, F. Kargl","doi":"10.1007/978-3-319-22846-4_12","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_12","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115372326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qingqing Chen, U. Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann
{"title":"MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography","authors":"Qingqing Chen, U. Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann","doi":"10.1007/978-3-319-22846-4_16","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_16","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127279663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why Attackers Win: On the Learnability of XOR Arbiter PUFs","authors":"F. Ganji, Shahin Tajik, Jean-Pierre Seifert","doi":"10.1007/978-3-319-22846-4_2","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_2","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128672799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DAA-A: Direct Anonymous Attestation with Attributes","authors":"Liqun Chen, Rainer Urian","doi":"10.1007/978-3-319-22846-4_14","DOIUrl":"https://doi.org/10.1007/978-3-319-22846-4_14","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114303782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}