Abstract is missing.
- Authenticated Encryption Primitives for Size-Constrained Trusted ComputingJan-Erik Ekberg, Alexandra Afanasyeva, N. Asokan. 1-18 [doi]
- Auditable Envelopes: Tracking Anonymity Revocation Using Trusted ComputingMatt Smart, Eike Ritter. 19-33 [doi]
- Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity PlatformsAmit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian Perrig. 34-54 [doi]
- Experimenting with Fast Private Set IntersectionEmiliano De Cristofaro, Gene Tsudik. 55-73 [doi]
- Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted ComputingDaniel Sangorrín, Shinya Honda, Hiroaki Takada. 74-91 [doi]
- Modelling User-Centered-Trust (UCT) in Software Systems: Interplay of Trust, Affect and Acceptance ModelZahid Hasan, Alina Krischkowsky, Manfred Tscheligi. 92-109 [doi]
- Clockless Physical Unclonable FunctionsJulian P. Murphy. 110-121 [doi]
- Lightweight Distributed Heterogeneous Attested Android CloudsMartin Pirker, Johannes Winter, Ronald Toegl. 122-141 [doi]
- Converse PUF-Based AuthenticationÜnal Koçabas, Andreas Peter, Stefan Katzenbeisser, Ahmad-Reza Sadeghi. 142-158 [doi]
- Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, Jonathan M. McCune. 159-178 [doi]
- Verifying System Integrity by ProxyJoshua Schiffman, Hayawardh Vijayakumar, Trent Jaeger. 179-200 [doi]
- Virtualization Based Password Protection against Malware in Untrusted Operating SystemsYueqiang Cheng, Xuhua Ding. 201-218 [doi]
- SmartTokens: Delegable Access Control with NFC-Enabled SmartphonesAlexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann. 219-238 [doi]
- A Belief Logic for Analyzing Security of Web ProtocolsApurva Kumar. 239-254 [doi]
- Provenance-Based Model for Verifying Trust-PropertiesCornelius Namiluko, Andrew Martin. 255-272 [doi]
- On the Practicality of Motion Based Keystroke Inference AttackLiang Cai, Hao Chen. 273-290 [doi]
- AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large ScaleClint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen. 291-307 [doi]
- Why Trust Seals Don't Work: A Study of User Perceptions and BehaviorIacovos Kirlappos, Martina Angela Sasse, Nigel Harvey. 308-324 [doi]
- Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy ConcernsSaijing Zheng, Pan Shi, Heng Xu, Cheng Zhang. 325-339 [doi]