{"title":"Improving Trusted Tickets with State-Bound Keys","authors":"Jan C. Nordholz, Ronald Aigner, P. England","doi":"10.1007/978-3-642-38908-5_3","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_3","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117187581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Klaus Potzmader, Johannes Winter, Daniel M. Hein, Christian H. Hanser, Peter Teufl, Liqun Chen
{"title":"Group Signatures on Mobile Devices: Practical Experiences","authors":"Klaus Potzmader, Johannes Winter, Daniel M. Hein, Christian H. Hanser, Peter Teufl, Liqun Chen","doi":"10.1007/978-3-642-38908-5_4","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_4","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limiting Data Exposure in Monitoring Multi-domain Policy Conformance","authors":"Mirko Montanari, J. Huh, R. Bobba, R. Campbell","doi":"10.1007/978-3-642-38908-5_5","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_5","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133052959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Steffen Bartsch, M. Volkamer, Heike Theuerling, Fatih Karayumak
{"title":"Contextualized Web Warnings, and How They Cause Distrust","authors":"Steffen Bartsch, M. Volkamer, Heike Theuerling, Fatih Karayumak","doi":"10.1007/978-3-642-38908-5_16","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_16","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114385211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"Fairly Truthful\": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure","authors":"M. Malheiros, Sören Preibusch, M. Sasse","doi":"10.1007/978-3-642-38908-5_19","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_19","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123592575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zongwei Zhou, Jun Han, Yue-Hsun Lin, A. Perrig, V. Gligor
{"title":"KISS: \"Key It Simple and Secure\" Corporate Key Management","authors":"Zongwei Zhou, Jun Han, Yue-Hsun Lin, A. Perrig, V. Gligor","doi":"10.1007/978-3-642-38908-5_1","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_1","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123955326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicholas Micallef, Mike Just, L. Baillie, H. G. Kayacik
{"title":"Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract)","authors":"Nicholas Micallef, Mike Just, L. Baillie, H. G. Kayacik","doi":"10.1007/978-3-642-38908-5_22","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_22","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129124807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook","authors":"A. Light, Lizzie Coles-Kemp","doi":"10.1007/978-3-642-38908-5_15","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_15","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134363029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}