Trust and Trustworthy Computing最新文献

筛选
英文 中文
Improving Trusted Tickets with State-Bound Keys 使用状态绑定密钥改进可信票证
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_3
Jan C. Nordholz, Ronald Aigner, P. England
{"title":"Improving Trusted Tickets with State-Bound Keys","authors":"Jan C. Nordholz, Ronald Aigner, P. England","doi":"10.1007/978-3-642-38908-5_3","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_3","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117187581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group Signatures on Mobile Devices: Practical Experiences 移动设备群签名:实践经验
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_4
Klaus Potzmader, Johannes Winter, Daniel M. Hein, Christian H. Hanser, Peter Teufl, Liqun Chen
{"title":"Group Signatures on Mobile Devices: Practical Experiences","authors":"Klaus Potzmader, Johannes Winter, Daniel M. Hein, Christian H. Hanser, Peter Teufl, Liqun Chen","doi":"10.1007/978-3-642-38908-5_4","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_4","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Limiting Data Exposure in Monitoring Multi-domain Policy Conformance 限制多域策略一致性监控中的数据暴露
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_5
Mirko Montanari, J. Huh, R. Bobba, R. Campbell
{"title":"Limiting Data Exposure in Monitoring Multi-domain Policy Conformance","authors":"Mirko Montanari, J. Huh, R. Bobba, R. Campbell","doi":"10.1007/978-3-642-38908-5_5","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_5","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133052959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Contextualized Web Warnings, and How They Cause Distrust 情境化的网络警告,以及它们如何引起不信任
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_16
Steffen Bartsch, M. Volkamer, Heike Theuerling, Fatih Karayumak
{"title":"Contextualized Web Warnings, and How They Cause Distrust","authors":"Steffen Bartsch, M. Volkamer, Heike Theuerling, Fatih Karayumak","doi":"10.1007/978-3-642-38908-5_16","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_16","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114385211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Quaestio-it.com: From Debates Towards Trustworthy Answers - (Extended Abstract) Quaestio-it.com:从争论到可信的答案-(扩展摘要)
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_23
Valentinos Evripidou, Francesca Toni
{"title":"Quaestio-it.com: From Debates Towards Trustworthy Answers - (Extended Abstract)","authors":"Valentinos Evripidou, Francesca Toni","doi":"10.1007/978-3-642-38908-5_23","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_23","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117072476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure “相当真实”:感知努力、公平性、相关性和敏感性对个人数据披露的影响
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_19
M. Malheiros, Sören Preibusch, M. Sasse
{"title":"\"Fairly Truthful\": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure","authors":"M. Malheiros, Sören Preibusch, M. Sasse","doi":"10.1007/978-3-642-38908-5_19","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_19","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123592575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
KISS: "Key It Simple and Secure" Corporate Key Management KISS:“Key It Simple and Secure”企业密钥管理
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_1
Zongwei Zhou, Jun Han, Yue-Hsun Lin, A. Perrig, V. Gligor
{"title":"KISS: \"Key It Simple and Secure\" Corporate Key Management","authors":"Zongwei Zhou, Jun Han, Yue-Hsun Lin, A. Perrig, V. Gligor","doi":"10.1007/978-3-642-38908-5_1","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_1","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123955326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract) 智能手机的非侵入式和透明认证-(扩展摘要)
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_22
Nicholas Micallef, Mike Just, L. Baillie, H. G. Kayacik
{"title":"Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract)","authors":"Nicholas Micallef, Mike Just, L. Baillie, H. G. Kayacik","doi":"10.1007/978-3-642-38908-5_22","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_22","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129124807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Verifiable Trust Management for Software Execution - (Extended Abstract) 面向软件执行的可验证信任管理——(扩展摘要)
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_24
M. Huth, Jim Huan-Pu Kuo
{"title":"Towards Verifiable Trust Management for Software Execution - (Extended Abstract)","authors":"M. Huth, Jim Huan-Pu Kuo","doi":"10.1007/978-3-642-38908-5_24","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_24","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117013876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook 孙女小心!管理Facebook使用中的信任问题的代际案例研究
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_15
A. Light, Lizzie Coles-Kemp
{"title":"Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook","authors":"A. Light, Lizzie Coles-Kemp","doi":"10.1007/978-3-642-38908-5_15","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_15","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134363029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信