{"id":"https://openalex.org/W2913777678","doi":"https://doi.org/10.1145/2808414","title":"Proceedings of the 5th International Workshop on Trustworthy Embedded Devices","display_name":"Proceedings of the 5th International Workshop on Trustworthy Embedded Devices","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W2913777678","doi":"https://doi.org/10.1145/2808414","mag":"2913777678"},"language":"en","primary_location":{"id":"doi:10.1145/2808414","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2808414","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.939300000667572,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.765954852104187},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6531469821929932},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6346381902694702},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.605343222618103},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5236287117004395},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.48849713802337646},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.412662148475647},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.39345625042915344},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3688296675682068},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.09168198704719543}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.765954852104187},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6531469821929932},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6346381902694702},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.605343222618103},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5236287117004395},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.48849713802337646},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.412662148475647},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.39345625042915344},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3688296675682068},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.09168198704719543}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2808414","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2808414","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W96612179","https://openalex.org/W2770234245","https://openalex.org/W2987774938","https://openalex.org/W2566006169","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W4229499248","https://openalex.org/W2063610494","https://openalex.org/W2054684024","https://openalex.org/W1603711083"],"abstract_inverted_index":{"The":[0,70,141,322],"5th":[1],"International":[2],"Workshop":[3],"on":[4,28,307],"Trustworthy":[5],"Embedded":[6],"Devices":[7],"(TrustED":[8],"2015)":[9],"was":[10],"held":[11,48],"October":[12],"16th,":[13],"2015":[14,36,217],"in":[15,43,49,86,164,229,257,264,281,348],"Denver,":[16],"Colorado,":[17],"USA,":[18],"and":[19,30,62,133,172,197,220,228,240,251,255,262,270,275,278,344,372],"has":[20,93,129],"been":[21,289],"co-located":[22],"with":[23,51,183],"the":[24,134,137,148,211,224,258,272,308,320,354,357],"22nd":[25],"ACM":[26,59,63],"Conference":[27],"Computer":[29],"Communications":[31],"Security":[32,55],"(CCS":[33],"2015).":[34],"TrustED":[35,216],"is":[37,119],"a":[38,330],"continuation":[39],"of":[40,72,81,124,136,143,151,176,215,223,226,231,236,260,332],"previous":[41],"workshops":[42],"this":[44,282],"series,":[45],"which":[46,167,298],"were":[47,299,316],"conjunction":[50],"ESORICS":[52],"2011,":[53],"IEEE":[54],"&":[56],"Privacy":[57],"2012,":[58],"CCS":[60,64],"2013,":[61],"2014":[65],"(see":[66],"http://www.trusted-workshop.de":[67],"for":[68,104],"details).":[69],"Internet":[71,142,225],"Things":[73,227],"promises":[74],"to":[75,96,107,113,130,185,191,203,245,268,305,353],"make":[76,114],"reality":[77,98],"Mark":[78],"Weisser's":[79],"vision":[80,92,116],"ubiquitous":[82],"computation":[83],"set":[84],"out":[85],"his":[87],"1991":[88],"influential":[89],"paper.":[90],"This":[91,284],"already":[94],"started":[95],"become":[97],"through":[99,147],"modern":[100],"technologies":[101],"that":[102,122,328],"allow":[103],"electronic":[105],"systems":[106,128,239,267],"be":[108,131],"embedded":[109,152,232,349],"practically":[110],"everywhere.":[111],"Yet":[112],"such":[115,159],"successful,":[117],"it":[118],"widely":[120],"acknowledged":[121],"security":[123,195,219,261],"super":[125],"large":[126],"distributed":[127],"guaranteed":[132],"privacy":[135,207,221,263],"collected":[138],"data":[139],"protected.":[140],"Things,":[144],"made":[145],"possible":[146],"wide":[149],"deployment":[150],"devices,":[153],"differs":[154],"significantly":[155],"from":[156,249],"\"classical\"":[157],"systems,":[158],"as":[160,198,234],"desktop":[161],"(networked)":[162],"PCs,":[163],"various":[165],"aspects,":[166],"include:":[168],"severe":[169],"computational,":[170],"memory,":[171],"power":[173],"constraints,":[174],"lack":[175],"advanced":[177],"user":[178],"interfaces,":[179],"an":[180,302],"increased":[181],"vulnerability":[182],"respect":[184],"physical":[186,238,266],"or":[187],"network":[188],"attacks,":[189,339],"inability":[190],"provide":[192],"strong":[193],"hardware":[194,340],"guarantees,":[196],"mentioned":[199],"previously,":[200],"their":[201,241],"tendency":[202],"collect":[204],"potentially":[205],"highly":[206,362],"sensitive":[208],"data.":[209],"Given":[210],"above,":[212],"major":[213],"themes":[214],"include":[218],"aspects":[222],"particular":[230],"devices":[233],"parts":[235],"cyber":[237,265],"environments.":[242],"It":[243],"aims":[244],"bring":[246],"together":[247],"experts":[248],"academia":[250],"research":[252],"institutes,":[253],"industry,":[254],"government":[256],"field":[259],"discuss":[269],"investigate":[271],"problems,":[273],"challenges,":[274],"recent":[276],"scientific":[277],"technological":[279],"developments":[280],"field.":[283],"year,":[285],"eleven":[286],"papers":[287,327],"have":[288],"submitted.":[290],"Each":[291],"paper":[292],"received":[293],"at":[294],"least":[295],"three":[296],"reviews,":[297],"followed":[300],"by":[301,312,319],"online":[303],"discussion":[304],"decide":[306],"program.":[309],"Papers":[310],"co-authored":[311],"one":[313],"PC":[314],"chair":[315],"exclusively":[317],"handled":[318],"other.":[321],"program":[323],"committee":[324],"accepted":[325],"six":[326],"cover":[329],"variety":[331],"topics,":[333],"including":[334],"Physical":[335],"Unclonable":[336],"Functions,":[337],"side-channel":[338],"security,":[341,343],"system":[342],"digital":[345],"rights":[346],"management":[347],"platforms.":[350],"In":[351],"addition":[352],"technical":[355],"program,":[356],"workshop":[358],"featured":[359],"four":[360],"internationally":[361],"renowned":[363],"speakers:":[364],"Geremy":[365],"Condra,":[366],"Marten":[367],"van":[368],"Dijk,":[369],"Jakub":[370],"Szefer,":[371],"Andr\u00e9":[373],"Weimerskirch.":[374]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
