Trust and Trustworthy Computing

8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings

  • Mauro Conti
  • Matthias Schunter
  • Ioannis Askoxylakis
Conference proceedings Trust 2015

DOI: 10.1007/978-3-319-22846-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9229)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Hardware-Enhanced Trusted Execution

    1. Front Matter
      Pages 1-1
    2. Florian Kohnhäuser, André Schaller, Stefan Katzenbeisser
      Pages 3-21
    3. Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
      Pages 22-39
    4. Thomas Nyman, Brian McGillion, N. Asokan
      Pages 58-67
  3. Trust and Users

    1. Front Matter
      Pages 69-69
    2. Michalis Kanakakis, Shenja van der Graaf, Costas Kalogiros, Wim Vanobberghen
      Pages 71-87
    3. Christos V. Samaras, Ageliki Tsioliaridou, Christos Liaskos, Dimitris Spiliotopoulos, Sotiris Ioannidis
      Pages 88-103
    4. Melanie Volkamer, Karen Renaud, Gamze Canova, Benjamin Reinheimer, Kristoffer Braun
      Pages 104-122
  4. Trusted Systems and Services

    1. Front Matter
      Pages 123-123
    2. Hamed Nemati, Mads Dam, Roberto Guanciale, Viktor Do, Arash Vahidi
      Pages 125-142
    3. Sourav Bhattacharya, Otto Huhta, N. Asokan
      Pages 143-162
    4. Frederik Armknecht, Ghassan O. Karame, Avikarsha Mandal, Franck Youssef, Erik Zenner
      Pages 163-180
    5. Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz, Maria Zhdanova
      Pages 181-190
  5. Trust and Privacy

    1. Front Matter
      Pages 191-191
    2. Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng
      Pages 209-227
    3. Liqun Chen, Rainer Urian
      Pages 228-245
  6. Building Blocks for Trust

    1. Front Matter
      Pages 247-247

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015.

The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.

Keywords

Bitcoin Embedded systems Hardware attacks and countermeasures Hardware-based security protocols Mobile systems PUF Physical unclonable functions Privacy-preserving protocols Reputation systems Security and privacy Security in hardware Security protocols Social network security and privacy Software security engineering TPM 2.0 Tamper-proof and tamper-resistant designs Trust models Trusted computing Trusted platform module Trustworthy computing

Editors and affiliations

  • Mauro Conti
    • 1
  • Matthias Schunter
    • 2
  • Ioannis Askoxylakis
    • 3
  1. 1.University of PaduaPaduaItaly
  2. 2.Intel LabsDarmstadtGermany
  3. 3.- Hellas (FORTH), CreteInstitute of Computer Science (ICS), Foundation for Research & TechnologyHeraklionGreece

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-22845-7
  • Online ISBN 978-3-319-22846-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349