Abstract is missing.
- Trusting the open latent IC backdoorsFarinaz Koushanfar. 1-2 [doi]
- RepCloud: achieving fine-grained cloud TCB attestation with reputation systemsAnbang Ruan, Andrew P. Martin. 3-14 [doi]
- Scalable trust establishment with software reputationSven Bugiel, Lucas Vincenzo Davi, Steffen Schulz 0001. 15-24 [doi]
- On scalability of remote attestationEmanuele Cesena, Gianluca Ramunno, Roberto Sassu, Davide Vernizzi, Antonio Lioy. 25-30 [doi]
- Achieving attestation with less effort: an indirect and configurable approach to integrity reportingJun Ho Huh, Hyoungshick Kim, John Lyle, Andrew P. Martin. 31-36 [doi]
- Identity verification schemes for public transport ticketing with NFC phonesSandeep Tamrakar, Jan-Erik Ekberg, N. Asokan. 37-48 [doi]
- Trusted virtual domains on OKL4: secure information sharing on smartphonesLucas Davi, Alexandra Dmitrienko, Christoph Kowalski, Marcel Winandy. 49-58 [doi]
- Logically reconfigurable PUFs: memory-based secure key storageIlze Eichhorn, Patrick Koeberl, Vincent van der Leest. 59-64 [doi]
- Credential life cycle management in open credential platforms (short paper)Kari Kostiainen, N. Asokan. 65-70 [doi]
- Are hardware performance counters a cost effective way for integrity checking of programsCorey Malone, Mohamed Zahran, Ramesh Karri. 71-76 [doi]