Nowadays, plenty of digital services are provided to citizens by means of terminals located in public unguarded places. In order to access the desired service, users, authenticate themselves by providing their credentials through such terminals. This approach opens up to the problem of fraudulent devices that could be installed in place of regular terminals to capture users' confidential information. Indeed, despite the development of increasingly secure systems aiming at guaranteeing an acceptable security level, users are frequently unable to distinguish between terminals on which security measures are enforced (trusted terminals) and malicious terminals that pretend to be trusted
Part 1: Invited PaperInternational audienceThe computer security community has traditionally regarde...
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in pe...
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...
Nowadays, plenty of digital services are provided to citizens by means of terminals located in publi...
The recent decades have witnessed dramatic developments in information and communication technologie...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Security is an interesting area, one in which we may well be guilty of misunderstanding the very peo...
Computer networks are facing unprecedented security risks. Dramatically impacting threats are now ta...
Part 9: Privacy Attacks and ProblemsInternational audienceAn individual who intends to engage in sen...
Networked computer systems underlie a great deal of business, social, and government activity today....
Trust is a concept of increasing importance in today’s information systems where information storage...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
An individual who intends to engage in sensitive transactions using a public terminal such as an ATM...
The Internet, which is a global and complex infrastructure, is a mechanism for information sharing a...
We present a technique based on Trusted Computing's remote attestation to enable the user of a publi...
Part 1: Invited PaperInternational audienceThe computer security community has traditionally regarde...
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in pe...
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...
Nowadays, plenty of digital services are provided to citizens by means of terminals located in publi...
The recent decades have witnessed dramatic developments in information and communication technologie...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Security is an interesting area, one in which we may well be guilty of misunderstanding the very peo...
Computer networks are facing unprecedented security risks. Dramatically impacting threats are now ta...
Part 9: Privacy Attacks and ProblemsInternational audienceAn individual who intends to engage in sen...
Networked computer systems underlie a great deal of business, social, and government activity today....
Trust is a concept of increasing importance in today’s information systems where information storage...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
An individual who intends to engage in sensitive transactions using a public terminal such as an ATM...
The Internet, which is a global and complex infrastructure, is a mechanism for information sharing a...
We present a technique based on Trusted Computing's remote attestation to enable the user of a publi...
Part 1: Invited PaperInternational audienceThe computer security community has traditionally regarde...
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in pe...
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...