Trust 2014 June 30, 2014 to July 2, 2014, Crete,Greece

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Lightweight and Secure Cryptographic Implementations for the Internet of Things Bart Preneel N/A
DAA-related APIs in TPM2.0 Revisited Dengguo Feng , Zhenfeng Zhang , Li Xi , Kang Yang N/A
Continuous Tamper-proof Logging using TPM 2.0 Limin Jia , Jacob r. Lorch , Arunesh Sinha , Paul England N/A
Lightweight Anti-Counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs Stefan Katzenbeisser , Andre Schaller , Tolga Arul , Vincent Leest N/A
Evaluation of Bistable Ring PUFs using Single Layer Neural Networks Dieter Schuster , Robert Hesselbart N/A
Affordable Separation on Embedded Platforms: Soft Reboot Enabled Virtualization on a Dual Mode System Oliver Schwarz , Christian Gehrmann , Viktor Do N/A
Owner-centric Protection of Unstructured Data on Smartphones Kapil Singh , Xuxian Jiang , Yajin Zhou N/A
On Usable Location Privacy for Android with Crowd-Recommendations Matthew Smith , Benjamin Henne , Christian Kater N/A
Data Protection in the Cloud Pierangela Samarati N/A
TPM2.0 Paul England N/A
Large-scale Security Analysis of the Web: Challenges and Findings Lieven Desmet , Wouter Joosen , Nick Nikiforakis , Ping Chen , Tom Van Goethem N/A
Towards A Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture Youki Kadobayashi , Suguru Yamaguchi , Doudou Fall , Takeshi Okuda N/A
PrivLoc: Preventing Location Tracking in Geofencing Services Jens Mathias Bohli , Dan Dobre , Ghassan O. Karame , Wenting Li N/A
Hiding Transaction Amounts and Balances in Bitcoin Ghassan O. Karame , Elli Androulaki N/A
Integration of Data-minimising Authentication into Authorization Dhouha Ayed , Jan Camenisch , Jerry Den Hartog , Patrik Bichsel N/A
Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant Vinh Bui , Richard Verhoeven , Johan Lukkien N/A
Sweet Dreams and Nightmares: Security in the Internet of Things Timo Kasper N/A
Special Session on Emerging Cyber Security Challenges in the Era of Future Internet Ioannis Askoxylakis N/A
Trust in Future Internet: the potential of Trustworthiness Enabling Technologies Pascal Bisson N/A
Who turned off the lights? Detecting ATPs in electricity networks Jorge Cuellar N/A
Talk: TBA Claire Vishik N/A
Special Session on Hardware-entangled Primitives: PUFs and More Ahmad-reza Sadeghi N/A
PUFs : Where are we standing? Jean-pierre Seifert N/A
How puffy are PUFs? - On the state of the art of PUF-based protocol design and analysis Christian Wachsmann N/A
Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems Per Håkon Meland , Nazila Gol Mohammadi , Torsten Bandyszak , Sachar Paulus , Thorsten Weyer , Klaus Pohl N/A
Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents John Zic N/A
Authentication System using Encrypted Discrete Biometrics Data Kazuo Ohzeki , Yuanyu Wei , Masaaki Kajihara , Masahiro Takatsuka , Yutaka Hirakawa , Toru Sugimoto N/A
On the Development of Automated Forensic Analysis Methods for Mobile Devices Vassilis Prevelakis , Panagiotis Andriotis , Theo Tryfonas , George Oikonomou , Zacharias Tzermias , Shancang Li , Konstantinos Xynos , Huw Read N/A
A Trusted Knowledge Management System for Multi-layer Threat Analysis Pawel Pawlinski , Thanasis Petsas , Kazuya Okada , Hajime Tazaki , Gregory Blanc N/A
Diagraming approach to structure the security lessons: Evaluation using Cognitive Dimensions Ying He , Maria Evangelopoulou , Zhengshuai Lin N/A
TRACER: A Platform for Securing Legacy Code Sotiris Ioannidis , Diomidis Spinellis , Panagiotis Papadopoulos , Zacharias Tzermias , Kostantinos Stroggylos , Dimitris Mitropoulos , Fotios Rafailidis , Panagiotis Katsaros N/A
Facilitating Trust on Data through Provenance Herbert Bos , Manolis Stamatogiannakis , Paul Groth N/A