Abstract is missing.
- Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android PlatformMohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-Pierre Seifert. 1-15 [doi]
- SBAP: Software-Based Attestation for PeripheralsYanlin Li, Jonathan M. McCune, Adrian Perrig. 16-29 [doi]
- Key Attestation from Trusted Execution EnvironmentsKari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, N. Asokan. 30-46 [doi]
- Anonymous Authentication with TLS and DAAEmanuele Cesena, Hans Löhr, Gianluca Ramunno, Ahmad-Reza Sadeghi, Davide Vernizzi. 47-62 [doi]
- Group-Based Attestation: Enhancing Privacy and Management in Remote AttestationSami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser. 63-77 [doi]
- Towards a Trusted Mobile DesktopMarcel Selhorst, Christian Stüble, Florian Feldmann, Utz Gnaida. 78-94 [doi]
- Lagrangian E-Voting: Verifiability on Demand and Strong PrivacyLukasz Krzywiecki, Miroslaw Kutylowski. 109-123 [doi]
- ::::µ::::TSS - A Simplified Trusted Software StackChristian Stüble, Anoosheh Zaerin. 124-140 [doi]
- Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized ArchitectureAmit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn, Adrian Perrig. 141-165 [doi]
- A DAA Scheme Using Batch Proof and VerificationLiqun Chen. 166-180 [doi]
- A Pairing-Based DAA Scheme Further Reducing TPM ResourcesErnie Brickell, Jiangtao Li. 181-195 [doi]
- An Anonymous Attestation Scheme with Optional TraceabilityJiangtao Li, Anand Rajan. 196-210 [doi]
- Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud ComputingF. John Krautheim, Dhananjay S. Phatak, Alan T. Sherman. 211-227 [doi]
- SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy PlatformsSergey Bratus, Michael E. Locasto, Brian Schulte. 228-245 [doi]
- Escrowed Data and the Digital EnvelopeKing Ables, Mark Dermot Ryan. 246-256 [doi]
- Engineering Attestable ServicesJohn Lyle, Andrew Martin. 257-264 [doi]
- Dynamic Enforcement of Platform IntegrityMartin Pirker, Ronald Toegl, Michael Gissing. 265-272 [doi]
- An Improved Memory Integrity Protection SchemeYin Hu, Berk Sunar. 273-281 [doi]
- Robust Combiners for Software HardeningAmir Herzberg, Haya Shulman. 282-289 [doi]
- The PUF PromiseHeike Busch, Miroslava Sotáková, Stefan Katzenbeisser, Radu Sion. 290-297 [doi]
- Privacy Requirements Engineering for Trustworthy e-Government ServicesNikos Vrakas, Christos Kalloniatis, Aggeliki Tsohou, Costas Lambrinoudakis. 298-307 [doi]
- Can Competitive Insurers Improve Network Security?Nikhil Shetty, Galina Schwartz, Jean C. Walrand. 308-322 [doi]
- Nudge: Intermediaries Role in Interdependent Network SecurityJens Grossklags, Svetlana Radosavac, Alvaro A. Cárdenas, John Chuang. 323-336 [doi]
- How the Public Views Strategies Designed to Reduce the Threat of BotnetsBrent Rowe, Dallas Wood, Douglas S. Reeves. 337-351 [doi]
- Axiomatic and Behavioural TrustClark D. Thomborson. 352-366 [doi]
- The Role of Soft Information in Trust Building: Evidence from Online Social LendingStefanie Pötzsch, Rainer Böhme. 381-395 [doi]
- Software on the Witness Stand: What Should It Take for Us to Trust It?Sergey Bratus, Ashlyn Lembree, Anna Shubina. 396-416 [doi]
- Token-Based Cloud ComputingAhmad-Reza Sadeghi, Thomas Schneider 0003, Marcel Winandy. 417-429 [doi]
- Oblivious Transfer Based on Physical Unclonable FunctionsUlrich Rührmair. 430-440 [doi]