Trust and Trustworthy Computing, 1st ed. 2015 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings Security and Cryptology Series
Coordonnateurs : Conti Mauro, Schunter Matthias, Askoxylakis Ioannis
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015.
The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.
Includes supplementary material: sn.pub/extras
Date de parution : 08-2015
Ouvrage de 328 p.
15.5x23.5 cm
Thème de Trust and Trustworthy Computing :
Mots-clés :
Bitcoin; Embedded systems; Hardware attacks and countermeasures; Hardware-based security protocols; Mobile systems; PUF; Physical unclonable functions; Privacy-preserving protocols; Reputation systems; Security and privacy; Security in hardware; Security protocols; Social network security and privacy; Software security engineering; TPM 2.0; Tamper-proof and tamper-resistant designs; Trust models; Trusted computing; Trusted platform module; Trustworthy computing