Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings / [electronic resource] :
edited by Michael Franz, Panos Papadimitratos.
- IX, 159 p. 51 illus. online resource.
- Lecture Notes in Computer Science, 9824 0302-9743 ; .
- Lecture Notes in Computer Science, 9824 .
Anonymous Attestation Using the Strong Diffe Hellman Assumption Revisited -- Practical Signing-Right Revocation -- Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness -- Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices -- Controversy in trust networks -- Enabling Key Migration Between Non-Compatible TPM Versions -- Bundling Evidence for Layered Attestation -- An arbiter PUF secured by remote random reconfigurations of an FPGA. .
This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016. The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs.
9783319455723
10.1007/978-3-319-45572-3 doi
Computer science.
Computer security.
Data encryption (Computer science).
Computers.
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Management of Computing and Information Systems.
Data Encryption.
Computers and Society.
Information Systems and Communication Service.
QA76.9.A25
005.8
Anonymous Attestation Using the Strong Diffe Hellman Assumption Revisited -- Practical Signing-Right Revocation -- Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness -- Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices -- Controversy in trust networks -- Enabling Key Migration Between Non-Compatible TPM Versions -- Bundling Evidence for Layered Attestation -- An arbiter PUF secured by remote random reconfigurations of an FPGA. .
This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016. The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs.
9783319455723
10.1007/978-3-319-45572-3 doi
Computer science.
Computer security.
Data encryption (Computer science).
Computers.
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Management of Computing and Information Systems.
Data Encryption.
Computers and Society.
Information Systems and Communication Service.
QA76.9.A25
005.8