SmartTokens: Delegable Access Control with NFC-Enabled Smartphones (English)
- New search for: Dmitrienko, Alexandra
- New search for: Sadeghi, Ahmad-Reza
- New search for: Tamrakar, Sandeep
- New search for: Wachsmann, Christian
- New search for: Dmitrienko, Alexandra
- New search for: Sadeghi, Ahmad-Reza
- New search for: Tamrakar, Sandeep
- New search for: Wachsmann, Christian
In:
TRUST, International Conference on Trust and Trustworthy Computing, 5
;
219-238
;
2012
-
ISSN:
- Conference paper / Print
-
Title:SmartTokens: Delegable Access Control with NFC-Enabled Smartphones
-
Contributors:Dmitrienko, Alexandra ( author ) / Sadeghi, Ahmad-Reza ( author ) / Tamrakar, Sandeep ( author ) / Wachsmann, Christian ( author )
-
Published in:Lecture Notes in Computer Science ; 7344 ; 219-238
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2012
-
Size:20 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Authenticated Encryption Primitives for Size-Constrained Trusted ComputingEkberg, J.-E. / Afanasyeva, A. / Asokan, N. et al. | 2012
- 19
-
Auditable Envelopes: Tracking Anonymity Revocation Using Trusted ComputingSmart, M. / Ritter, E. et al. | 2012
- 34
-
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity PlatformsVasudevan, A. / Parno, B. / Qu, N. / Gligor, V.D. / Perrig, A. et al. | 2012
- 55
-
Experimenting with Fast Private Set IntersectionDe Cristofaro, E. / Tsudik, G. et al. | 2012
- 74
-
Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted ComputingSangorrin, D. / Honda, S. / Takada, H. et al. | 2012
- 92
-
Modelling User-Centered-Trust (UCT) in Software Systems: Interplay of Trust, Affect and Acceptance ModelHasan, Z. / Krischkowsky, A. / Tscheligi, M. et al. | 2012
- 110
-
Clockless Physical Unclonable FunctionsMurphy, J. et al. | 2012
- 122
-
Lightweight Distributed Heterogeneous Attested Android CloudsPirker, M. / Winter, J. / Toegl, R. et al. | 2012
- 142
-
Converse PUF-Based AuthenticationKocabas, U. / Peter, A. / Katzenbeisser, S. / Sadeghi, A.-R. et al. | 2012
- 159
-
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?Vasudevan, A. / Owusu, E. / Zhou, Z. / Newsome, J. / McCune, J.M. et al. | 2012
- 179
-
Verifying System Integrity by ProxySchiffman, J. / Vijayakumar, H. / Jaeger, T. et al. | 2012
- 201
-
Virtualization Based Password Protection against Malware in Untrusted Operating SystemsCheng, Y. / Ding, X. et al. | 2012
- 219
-
SmartTokens: Delegable Access Control with NFC-Enabled SmartphonesDmitrienko, A. / Sadeghi, A.-R. / Tamrakar, S. / Wachsmann, C. et al. | 2012
- 239
-
A Belief Logic for Analyzing Security of Web ProtocolsKumar, A. et al. | 2012
- 255
-
Provenance-Based Model for Verifying Trust-PropertiesNamiluko, C. / Martin, A. et al. | 2012
- 273
-
On the Practicality of Motion Based Keystroke Inference AttackCai, L. / Chen, H. et al. | 2012
- 291
-
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large ScaleGibler, C. / Crussell, J. / Erickson, J. / Chen, H. et al. | 2012
- 308
-
Why Trust Seals Don't Work: A Study of User Perceptions and BehaviorKirlappos, I. / Sasse, M.A. / Harvey, N. et al. | 2012
- 325
-
Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy ConcernsZheng, S. / Shi, P. / Xu, H. / Zhang, C. et al. | 2012