LEADER 04103nam 22007455 450 001 996465321103316 005 20200706064557.0 010 $a3-319-45572-9 024 7 $a10.1007/978-3-319-45572-3 035 $a(CKB)3710000000837748 035 $a(DE-He213)978-3-319-45572-3 035 $a(MiAaPQ)EBC6298116 035 $a(MiAaPQ)EBC5591719 035 $a(Au-PeEL)EBL5591719 035 $a(OCoLC)957985032 035 $a(PPN)194804356 035 $a(EXLCZ)993710000000837748 100 $a20160820d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTrust and Trustworthy Computing$b[electronic resource] $e9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings /$fedited by Michael Franz, Panos Papadimitratos 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (IX, 159 p. 51 illus.) 225 1 $aSecurity and Cryptology ;$v9824 300 $aIncludes index. 311 $a3-319-45571-0 327 $aAnonymous Attestation Using the Strong Diffe Hellman Assumption Revisited -- Practical Signing-Right Revocation -- Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness -- Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices -- Controversy in trust networks -- Enabling Key Migration Between Non-Compatible TPM Versions -- Bundling Evidence for Layered Attestation -- An arbiter PUF secured by remote random reconfigurations of an FPGA. . 330 $aThis book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016. The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. 410 0$aSecurity and Cryptology ;$v9824 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputers 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aComputers. 615 14$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aInformation Systems and Communication Service. 676 $a005.8 702 $aFranz$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPapadimitratos$b Panos$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465321103316 996 $aTrust and Trustworthy Computing$92829757 997 $aUNISA