Skip to main content
  • Conference proceedings
  • © 2012

Trust and Trustworthy Computing

5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7344)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Trust: International Conference on Trust and Trustworthy Computing

Conference proceedings info: Trust 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (19 papers)

  1. Front Matter

  2. Technical Strand

    1. Authenticated Encryption Primitives for Size-Constrained Trusted Computing

      • Jan-Erik Ekberg, Alexandra Afanasyeva, N. Asokan
      Pages 1-18
    2. Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms

      • Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian Perrig
      Pages 34-54
    3. Experimenting with Fast Private Set Intersection

      • Emiliano De Cristofaro, Gene Tsudik
      Pages 55-73
    4. Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing

      • Daniel Sangorrín, Shinya Honda, Hiroaki Takada
      Pages 74-91
    5. Clockless Physical Unclonable Functions

      • Julian Murphy
      Pages 110-121
    6. Lightweight Distributed Heterogeneous Attested Android Clouds

      • Martin Pirker, Johannes Winter, Ronald Toegl
      Pages 122-141
    7. Converse PUF-Based Authentication

      • Ãœnal KocabaÅŸ, Andreas Peter, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
      Pages 142-158
    8. Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?

      • Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, Jonathan M. McCune
      Pages 159-178
    9. Verifying System Integrity by Proxy

      • Joshua Schiffman, Hayawardh Vijayakumar, Trent Jaeger
      Pages 179-200
    10. SmartTokens: Delegable Access Control with NFC-Enabled Smartphones

      • Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann
      Pages 219-238
    11. Provenance-Based Model for Verifying Trust-Properties

      • Cornelius Namiluko, Andrew Martin
      Pages 255-272
  3. Socio-economic Strand

    1. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale

      • Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen
      Pages 291-307
    2. Why Trust Seals Don’t Work: A Study of User Perceptions and Behavior

      • Iacovos Kirlappos, M. Angela Sasse, Nigel Harvey
      Pages 308-324

Other Volumes

  1. Trust and Trustworthy Computing

About this book

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

Editors and Affiliations

  • Department of Computer Science, Technical University Darmstadt, Darmstadt, Germany

    Stefan Katzenbeisser, Melanie Volkamer

  • Institute of Software Technology and Interactive Systems, Vienna University of Technology and SBA Research, Vienna, Austria

    Edgar Weippl

  • School of Informatics, Indiana University, Bloomington, USA

    L. Jean Camp

  • Department of Computer Science, University of North Carolina at Chapel Hill, Chapel Hill, USA

    Mike Reiter

  • Huawei America R&D, Santa Clara, USA

    Xinwen Zhang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access