Abstract is missing.
- DAA-Related APIs in TPM 2.0 RevisitedLi Xi, Kang Yang, Zhenfeng Zhang, Dengguo Feng. 1-18 [doi]
- Continuous Tamper-Proof Logging Using TPM 2.0Arunesh Sinha, Limin Jia, Paul England, Jacob R. Lorch. 19-36 [doi]
- Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode SystemOliver Schwarz, Christian Gehrmann, Viktor Do. 37-54 [doi]
- Owner-Centric Protection of Unstructured Data on SmartphonesYajin Zhou, Kapil Singh, Xuxian Jiang. 55-73 [doi]
- On Usable Location Privacy for Android with Crowd-RecommendationsBenjamin Henne, Christian Kater, Matthew Smith. 74-82 [doi]
- Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFsAndré Schaller, Tolga Arul, Vincent van der Leest, Stefan Katzenbeisser. 83-100 [doi]
- Evaluation of Bistable Ring PUFs Using Single Layer Neural NetworksDieter Schuster, Robert Hesselbarth. 101-109 [doi]
- Large-Scale Security Analysis of the Web: Challenges and FindingsTom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, Wouter Joosen. 110-126 [doi]
- Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical ArchitectureDoudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi. 127-142 [doi]
- PrivLoc: Preventing Location Tracking in Geofencing ServicesJens-Matthias Bohli, Dan Dobre, Ghassan O. Karame, Wenting Li. 143-160 [doi]
- Hiding Transaction Amounts and Balances in BitcoinElli Androulaki, Ghassan O. Karame. 161-178 [doi]
- Integration of Data-Minimising Authentication into Authorisation SystemsDhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog. 179-187 [doi]
- Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the ElephantVinh Bui, Richard Verhoeven, Johan Lukkien. 188-205 [doi]
- Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract)Nazila Gol Mohammadi, Torsten Bandyszak, Sachar Paulus, Per Håkon Meland, Thorsten Weyer, Klaus Pohl. 206-207 [doi]
- Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents - (Extended Abstract)John Zic. 208-209 [doi]
- Authentication System Using Encrypted Discrete Biometrics DataKazuo Ohzeki, Yuanyu Wei, Masaaki Kajihara, Masahiro Takatsuka, Yutaka Hirakawa, Toru Sugimoto. 210-211 [doi]
- On the Development of Automated Forensic Analysis Methods for Mobile DevicesPanagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Shancang Li, Zacharias Tzermias, Konstantinos Xynos, Huw Read, Vassilis Prevelakis. 212-213 [doi]
- A Trusted Knowledge Management System for Multi-layer Threat AnalysisThanasis Petsas, Kazuya Okada, Hajime Tazaki, Gregory Blanc, Pawel Pawlinski. 214-215 [doi]
- Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive DimensionsYing He, Chris Johnson, Maria Evangelopoulou, Zheng-Shuai Lin. 216-217 [doi]
- TRACER: A Platform for Securing Legacy CodeKostantinos Stroggylos, Dimitris Mitropoulos, Zacharias Tzermias, Panagiotis Papadopoulos, Fotios Rafailidis, Diomidis Spinellis, Sotiris Ioannidis, Panagiotis Katsaros. 218-219 [doi]
- Facilitating Trust on Data through ProvenanceManolis Stamatogiannakis, Paul Groth, Herbert Bos. 220-221 [doi]
- Early Warning Intrusion Detection SystemPanos Chatziadam, Ioannis G. Askoxylakis, Nikolaos E. Petroulakis, Alexandros G. Fragkiadakis. 222-223 [doi]