Trust and Trustworthy Computing最新文献

筛选
英文 中文
Hiding Transaction Amounts and Balances in Bitcoin 隐藏比特币交易金额和余额
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_11
Elli Androulaki, Ghassan O. Karame
{"title":"Hiding Transaction Amounts and Balances in Bitcoin","authors":"Elli Androulaki, Ghassan O. Karame","doi":"10.1007/978-3-319-08593-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_11","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122273136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System 嵌入式平台上可负担得起的分离——双模式系统上的软重启虚拟化
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_3
Oliver Schwarz, C. Gehrmann, Viktor Do
{"title":"Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System","authors":"Oliver Schwarz, C. Gehrmann, Viktor Do","doi":"10.1007/978-3-319-08593-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_3","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132645247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Facilitating Trust on Data through Provenance 通过来源促进对数据的信任
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_21
Manolis Stamatogiannakis, Paul T. Groth, H. Bos
{"title":"Facilitating Trust on Data through Provenance","authors":"Manolis Stamatogiannakis, Paul T. Groth, H. Bos","doi":"10.1007/978-3-319-08593-7_21","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_21","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117072524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract) 为社会技术系统扩展具有设计可信度的开发方法-(扩展摘要)
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_14
N. Mohammadi, Torsten Bandyszak, Sachar Paulus, P. H. Meland, Thorsten Weyer, K. Pohl
{"title":"Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract)","authors":"N. Mohammadi, Torsten Bandyszak, Sachar Paulus, P. H. Meland, Thorsten Weyer, K. Pohl","doi":"10.1007/978-3-319-08593-7_14","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_14","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Owner-Centric Protection of Unstructured Data on Smartphones 智能手机上以所有者为中心的非结构化数据保护
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_4
Yajin Zhou, Kapil Singh, Xuxian Jiang
{"title":"Owner-Centric Protection of Unstructured Data on Smartphones","authors":"Yajin Zhou, Kapil Singh, Xuxian Jiang","doi":"10.1007/978-3-319-08593-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_4","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127200085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Continuous Tamper-Proof Logging Using TPM 2.0 使用TPM 2.0的连续防篡改日志记录
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_2
Arunesh Sinha, Limin Jia, P. England, Jacob R. Lorch
{"title":"Continuous Tamper-Proof Logging Using TPM 2.0","authors":"Arunesh Sinha, Limin Jia, P. England, Jacob R. Lorch","doi":"10.1007/978-3-319-08593-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_2","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Evaluation of Bistable Ring PUFs Using Single Layer Neural Networks 用单层神经网络评价双稳环PUFs
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_7
Dieter Schuster, Robert Hesselbarth
{"title":"Evaluation of Bistable Ring PUFs Using Single Layer Neural Networks","authors":"Dieter Schuster, Robert Hesselbarth","doi":"10.1007/978-3-319-08593-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_7","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116281683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant 通过监测评估可信度:脚、马和象
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_13
Vinh T. Bui, R. Verhoeven, J. Lukkien
{"title":"Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant","authors":"Vinh T. Bui, R. Verhoeven, J. Lukkien","doi":"10.1007/978-3-319-08593-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_13","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126844093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Trusted Knowledge Management System for Multi-layer Threat Analysis 面向多层威胁分析的可信知识管理系统
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_18
Thanasis Petsas, Kazuya Okada, Hajime Tazaki, Grégory Blanc, Pawel Pawlinski
{"title":"A Trusted Knowledge Management System for Multi-layer Threat Analysis","authors":"Thanasis Petsas, Kazuya Okada, Hajime Tazaki, Grégory Blanc, Pawel Pawlinski","doi":"10.1007/978-3-319-08593-7_18","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_18","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125436339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive Dimensions 构建安全课程的图解方法:使用认知维度进行评估
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_19
Ying He, Chris W. Johnson, Maria Evangelopoulou, Zheng-Shuai Lin
{"title":"Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive Dimensions","authors":"Ying He, Chris W. Johnson, Maria Evangelopoulou, Zheng-Shuai Lin","doi":"10.1007/978-3-319-08593-7_19","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_19","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125891629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信