Advertisement

Trust and Trustworthy Computing

5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings

  • Stefan Katzenbeisser
  • Edgar Weippl
  • L. Jean Camp
  • Melanie Volkamer
  • Mike Reiter
  • Xinwen Zhang

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7344)

Table of contents

  1. Front Matter
  2. Technical Strand

    1. Jan-Erik Ekberg, Alexandra Afanasyeva, N. Asokan
      Pages 1-18
    2. Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian Perrig
      Pages 34-54
    3. Emiliano De Cristofaro, Gene Tsudik
      Pages 55-73
    4. Daniel Sangorrín, Shinya Honda, Hiroaki Takada
      Pages 74-91
    5. Julian Murphy
      Pages 110-121
    6. Martin Pirker, Johannes Winter, Ronald Toegl
      Pages 122-141
    7. Ünal Kocabaş, Andreas Peter, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
      Pages 142-158
    8. Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, Jonathan M. McCune
      Pages 159-178
    9. Joshua Schiffman, Hayawardh Vijayakumar, Trent Jaeger
      Pages 179-200
    10. Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann
      Pages 219-238
    11. Cornelius Namiluko, Andrew Martin
      Pages 255-272
  3. Socio-economic Strand

    1. Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen
      Pages 291-307
    2. Iacovos Kirlappos, M. Angela Sasse, Nigel Harvey
      Pages 308-324
  4. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

Keywords

cloud node security e-commerce online social networks verification virtualization

Editors and affiliations

  • Stefan Katzenbeisser
    • 1
  • Edgar Weippl
    • 2
  • L. Jean Camp
    • 3
  • Melanie Volkamer
    • 1
  • Mike Reiter
    • 4
  • Xinwen Zhang
    • 5
  1. 1.Department of Computer ScienceTechnical University DarmstadtDarmstadtGermany
  2. 2.Institute of Software Technology and Interactive SystemsVienna University of Technology and SBA ResearchViennaAustria
  3. 3.School of InformaticsIndiana UniversityBloomingtonUSA
  4. 4.Department of Computer ScienceUniversity of North Carolina at Chapel HillChapel HillUSA
  5. 5.Huawei America R&DSanta ClaraUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-30921-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-30920-5
  • Online ISBN 978-3-642-30921-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace