Trust and Trustworthy Computing最新文献

筛选
英文 中文
Tapping and Tripping with NFC 用NFC敲击和绊倒
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_9
Sandeep Tamrakar, Jan-Erik Ekberg
{"title":"Tapping and Tripping with NFC","authors":"Sandeep Tamrakar, Jan-Erik Ekberg","doi":"10.1007/978-3-642-38908-5_9","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_9","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130135287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Formal Evaluation of Persona Trustworthiness with EUSTACE - (Extended Abstract) 用EUSTACE对人物可信度的形式化评价-(扩展摘要)
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_20
Shamal Faily, D. Power, Philip J. Armstrong, I. Flechais
{"title":"Formal Evaluation of Persona Trustworthiness with EUSTACE - (Extended Abstract)","authors":"Shamal Faily, D. Power, Philip J. Armstrong, I. Flechais","doi":"10.1007/978-3-642-38908-5_20","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_20","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130932299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Trustworthy Network Measurements 迈向可信赖的网络测量
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_6
Ghassan O. Karame
{"title":"Towards Trustworthy Network Measurements","authors":"Ghassan O. Karame","doi":"10.1007/978-3-642-38908-5_6","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_6","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115187921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Lightweight Distributed Heterogeneous Attested Android Clouds 轻量级分布式异构认证Android云
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_8
Martin Pirker, Johannes Winter, Ronald Toegl
{"title":"Lightweight Distributed Heterogeneous Attested Android Clouds","authors":"Martin Pirker, Johannes Winter, Ronald Toegl","doi":"10.1007/978-3-642-30921-2_8","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_8","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131462789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? 可信赖的移动设备执行:我的移动平台可以给我什么样的安全属性?
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_10
Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, J. Newsome, Jonathan M. McCune
{"title":"Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?","authors":"Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, J. Newsome, Jonathan M. McCune","doi":"10.1007/978-3-642-30921-2_10","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_10","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130842578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Provenance-Based Model for Verifying Trust-Properties 基于来源的信任属性验证模型
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_15
Cornelius Namiluko, Andrew P. Martin
{"title":"Provenance-Based Model for Verifying Trust-Properties","authors":"Cornelius Namiluko, Andrew P. Martin","doi":"10.1007/978-3-642-30921-2_15","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_15","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130941796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modelling User-Centered-Trust (UCT) in Software Systems: Interplay of Trust, Affect and Acceptance Model 软件系统中以用户为中心的信任建模:信任、影响和接受模型的相互作用
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_6
Zahid Hasan, Alina Krischkowsky, M. Tscheligi
{"title":"Modelling User-Centered-Trust (UCT) in Software Systems: Interplay of Trust, Affect and Acceptance Model","authors":"Zahid Hasan, Alina Krischkowsky, M. Tscheligi","doi":"10.1007/978-3-642-30921-2_6","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_6","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134433938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Clockless Physical Unclonable Functions 无时钟物理不可克隆函数
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_7
Julian P. Murphy
{"title":"Clockless Physical Unclonable Functions","authors":"Julian P. Murphy","doi":"10.1007/978-3-642-30921-2_7","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_7","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116991384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experimenting with Fast Private Set Intersection 实验快速私有集合交集
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_4
Emiliano De Cristofaro, G. Tsudik
{"title":"Experimenting with Fast Private Set Intersection","authors":"Emiliano De Cristofaro, G. Tsudik","doi":"10.1007/978-3-642-30921-2_4","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_4","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117235078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
On the Practicality of Motion Based Keystroke Inference Attack 基于动作的击键推理攻击的实用性研究
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_16
Liang Cai, Hao Chen
{"title":"On the Practicality of Motion Based Keystroke Inference Attack","authors":"Liang Cai, Hao Chen","doi":"10.1007/978-3-642-30921-2_16","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_16","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133913102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 107
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信