1.

Record Nr.

UNISA996465321103316

Titolo

Trust and Trustworthy Computing [[electronic resource] ] : 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings / / edited by Michael Franz, Panos Papadimitratos

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016

ISBN

3-319-45572-9

Edizione

[1st ed. 2016.]

Descrizione fisica

1 online resource (IX, 159 p. 51 illus.)

Collana

Security and Cryptology ; ; 9824

Disciplina

005.8

Soggetti

Computer security

Management information systems

Computer science

Data encryption (Computer science)

Computers and civilization

Computers

Systems and Data Security

Management of Computing and Information Systems

Cryptology

Computers and Society

Information Systems and Communication Service

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Anonymous Attestation Using the Strong Diffe Hellman Assumption Revisited -- Practical Signing-Right Revocation -- Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness -- Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices -- Controversy in trust networks -- Enabling Key Migration Between Non-Compatible TPM Versions -- Bundling Evidence for Layered Attestation -- An arbiter PUF secured by remote random reconfigurations of an FPGA. .

Sommario/riassunto

This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in



Vienna, Austria, in August 2016. The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs.