Trust and Trustworthy Computing最新文献

筛选
英文 中文
Verifying System Integrity by Proxy 通过代理验证系统完整性
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_11
Joshua Schiffman, H. Vijayakumar, T. Jaeger
{"title":"Verifying System Integrity by Proxy","authors":"Joshua Schiffman, H. Vijayakumar, T. Jaeger","doi":"10.1007/978-3-642-30921-2_11","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_11","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121343359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale AndroidLeaks:自动检测大规模Android应用程序中潜在的隐私泄露
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_17
Clint Gibler, J. Crussell, Jeremy Erickson, Hao Chen
{"title":"AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale","authors":"Clint Gibler, J. Crussell, Jeremy Erickson, Hao Chen","doi":"10.1007/978-3-642-30921-2_17","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_17","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125993626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 543
Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing 双操作系统嵌入式可信计算的可靠设备共享机制
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_5
D. Sangorrín, S. Honda, H. Takada
{"title":"Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing","authors":"D. Sangorrín, S. Honda, H. Takada","doi":"10.1007/978-3-642-30921-2_5","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_5","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128498708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Belief Logic for Analyzing Security of Web Protocols 一种分析Web协议安全性的信念逻辑
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_14
Apurva Kumar
{"title":"A Belief Logic for Analyzing Security of Web Protocols","authors":"Apurva Kumar","doi":"10.1007/978-3-642-30921-2_14","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_14","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128013194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns 在Facebook上发布新的个人资料:了解用户隐私问题的触发因素和结果
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_19
Saijing Zheng, Pan Shi, Heng Xu, Cheng Zhang
{"title":"Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns","authors":"Saijing Zheng, Pan Shi, Heng Xu, Cheng Zhang","doi":"10.1007/978-3-642-30921-2_19","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_19","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms 锁定:面向商品平台上安全应用程序的安全实用架构
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_3
Amit Vasudevan, Bryan Parno, Ning Qu, V. Gligor, A. Perrig
{"title":"Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms","authors":"Amit Vasudevan, Bryan Parno, Ning Qu, V. Gligor, A. Perrig","doi":"10.1007/978-3-642-30921-2_3","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_3","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130849141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing 可审计信封:使用可信计算跟踪匿名撤销
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_2
M. Smart, Eike Ritter
{"title":"Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing","authors":"M. Smart, Eike Ritter","doi":"10.1007/978-3-642-30921-2_2","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_2","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125566090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Why Trust Seals Don't Work: A Study of User Perceptions and Behavior 为什么信任印章不起作用:一项关于用户感知和行为的研究
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_18
I. Kirlappos, M. Sasse, N. Harvey
{"title":"Why Trust Seals Don't Work: A Study of User Perceptions and Behavior","authors":"I. Kirlappos, M. Sasse, N. Harvey","doi":"10.1007/978-3-642-30921-2_18","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_18","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134181336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Authenticated Encryption Primitives for Size-Constrained Trusted Computing 大小受限可信计算的认证加密原语
Trust and Trustworthy Computing Pub Date : 2012-06-13 DOI: 10.1007/978-3-642-30921-2_1
Jan-Erik Ekberg, A. Afanasyeva, N. Asokan
{"title":"Authenticated Encryption Primitives for Size-Constrained Trusted Computing","authors":"Jan-Erik Ekberg, A. Afanasyeva, N. Asokan","doi":"10.1007/978-3-642-30921-2_1","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_1","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124656800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Converse PUF-Based Authentication 基于puf的反向认证
Trust and Trustworthy Computing Pub Date : 2012-06-01 DOI: 10.1007/978-3-642-30921-2_9
Ünal Koçabas, Andreas Peter, S. Katzenbeisser, A. Sadeghi
{"title":"Converse PUF-Based Authentication","authors":"Ünal Koçabas, Andreas Peter, S. Katzenbeisser, A. Sadeghi","doi":"10.1007/978-3-642-30921-2_9","DOIUrl":"https://doi.org/10.1007/978-3-642-30921-2_9","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132779030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信