Abstract is missing.
- KISS: "Key It Simple and Secure" Corporate Key ManagementZongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil D. Gligor. 1-18 [doi]
- Guardian: Hypervisor as Security Foothold for Personal ComputersYueqiang Cheng, Xuhua Ding. 19-36 [doi]
- Improving Trusted Tickets with State-Bound KeysJan Nordholz, Ronald Aigner, Paul England. 37-46 [doi]
- Group Signatures on Mobile Devices: Practical ExperiencesKlaus Potzmader, Johannes Winter, Daniel Hein, Christian Hanser, Peter Teufl, Liqun Chen. 47-64 [doi]
- Limiting Data Exposure in Monitoring Multi-domain Policy ConformanceMirko Montanari, Jun Ho Huh, Rakesh Bobba, Roy H. Campbell. 65-82 [doi]
- Towards Trustworthy Network MeasurementsGhassan Karame. 83-91 [doi]
- Stochastic Model of a Metastability-Based True Random Number GeneratorMolka Ben-Romdhane, Tarik Graba, Jean-Luc Danger. 92-105 [doi]
- Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation PlatformMartin Pirker, Johannes Winter. 106-114 [doi]
- Tapping and Tripping with NFCSandeep Tamrakar, Jan-Erik Ekberg. 115-132 [doi]
- TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security ApplicationsWei Feng, Dengguo Feng, Ge Wei, Yu Qin, Qianying Zhang, Dexian Chang. 133-141 [doi]
- TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural AreasChris Burnett, Peter Edwards, Timothy J. Norman, Liang Chen, Yogachandran Rahulamathavan, Mariesha Jaffray, Edoardo Pignotti. 142-150 [doi]
- First-Class Labels: Using Information Flow to Debug Security HolesEric Hennigan, Christoph Kerschbaumer, Stefan Brunthaler, Per Larsen, Michael Franz. 151-168 [doi]
- A Framework for Evaluating Mobile App Repackaging Detection AlgorithmsHeqing Huang, Sencun Zhu, Peng Liu 0005, Dinghao Wu. 169-186 [doi]
- Towards Precise and Efficient Information Flow Control in Web BrowsersChristoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz. 187-195 [doi]
- Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of FacebookAnn Light, Lizzie Coles-Kemp. 196-204 [doi]
- Contextualized Web Warnings, and How They Cause DistrustSteffen Bartsch, Melanie Volkamer, Heike Theuerling, Fatih Karayumak. 205-222 [doi]
- All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of ThingsMarc Busch, Christina Hochleitner, Mario Lorenz, Trenton Schulz, Manfred Tscheligi, Eckhart Wittstock. 223-231 [doi]
- Trust Domains: An Algebraic, Logical, and Utility-Theoretic ApproachGabrielle Anderson, Matthew Collinson, David J. Pym. 232-249 [doi]
- "Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data DisclosureMiguel Malheiros, Sören Preibusch, Martina Angela Sasse. 250-266 [doi]
- Formal Evaluation of Persona Trustworthiness with EUSTACE - (Extended Abstract)Shamal Faily, David Power, Philip Armstrong, Ivan Flechais. 267-268 [doi]
- Identity Implies Trust in Distributed Systems - A Novel Approach - (Extended Abstract)Lyzgeo Merin Koshy, Marc Conrad, Mitul Shukla, Tim French. 269-270 [doi]
- Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract)Nicholas Micallef, Mike Just, Lynne Baillie, Hilmi Günes Kayacik. 271-272 [doi]
- Quaestio-it.com: From Debates Towards Trustworthy Answers - (Extended Abstract)Valentinos Evripidou, Francesca Toni. 273-274 [doi]
- Towards Verifiable Trust Management for Software Execution - (Extended Abstract)Michael Huth, Jim Huan-Pu Kuo. 275-276 [doi]