CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.
Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .
Resultado final
A handbook describing the project management, quality control and risk assessment procedures adopted in the project.
Trust Abstractions & Cryptographic Anchors for CMD Secure Operation (se abrirá en una nueva ventana)Report on the progress of Tasks 3.1 – 3.3 on defining the appropriate formal models and theorem proofs capturing all of the cryptographic primitives to be leveraged for safeguarding the device’s operation.
Impact Maximization Activities Interim Report (se abrirá en una nueva ventana)Documentation on the dissemination, communication, clustering, standardization, and exploitation activities. Highlighting open-source contributions and workshop organization activities.
Dissemination, Communication & Exploitation Plan (se abrirá en una nueva ventana)Documentation on T7.1 and on the planned dissemination, exploitation and communication activities.
ENTRUST Reference Architecture – Initial Release (se abrirá en una nueva ventana)Documentation of the background and gaps (T2.1), the functional and non-functional requirements (T2.2) and the first version of the ENTRUST Architecture (T2.3) accompanied with the first version of the ethical analysis (T2.4) on the measures of evidence to be considered and the type of secure elements to be used (T2.5).
Documentation on the Blockchain architecture and services and the role of device-side software agents and their lifecycle management (T5.1-5).
Runtime Assurance & Certification Framework – First Release (se abrirá en una nueva ventana)Early release of the ENTRUST Runtime Assurance & Certification Framework (T4.3-4).
Conceptual Architecture of ENTRUST Customizable TC and Attestation Models Specifications (se abrirá en una nueva ventana)Report on the progress of T4.1-2 on blueprinting the architecture of the customisable TC and all envisioned functionalities alongside the methodology for enforcing runtime behavioural attestation.
ENTRUST Risk Assessment & Collective Threat Intelligence Framework – Initial Release (se abrirá en una nueva ventana)Early release of ENTRUST Risk Assessment Framework (T3.4) and Attack Validation component (T3.5), including an update on the defined trust models based on any newly identified attack vectors.
The release of the ENTRUST Website as well as the created project's design profile.
Publicaciones
Autores:
Erik Johannes Husom, Rustem Dautov, Arda Goknil
Editor:
IEEE
DOI:
10.1109/ACSOS-C66519.2025.00025
Autores:
Wouter Hellemans, Nada El Kassem, Md Masoom Rabbani, Edlira Dushku, Liqun Chen, An Braeken, Bart Preneel, Nele Mentens
Editor:
IEEE
DOI:
10.1109/EUROSP63326.2025.00056
Autores:
Steve Taylor, Martin Gilje Jaatun, Karin Bernsmed, Christos Androutsos, Dietmar Frey, Simone Favrin, João Rodrigues, DušKo Milojević, Dimitrios Karras, Ioannis Siachos, Gregory Epiphaniou, Nabil Moukafih, Sotiris Messinis, Ioannis Rallis, et al.
Publicado en:
PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, Edición Pages 593 - 599, 2024, ISBN 979-8-4007-1760-4
Editor:
ACM
DOI:
10.5281/ZENODO.13383761
Autores:
Yalan Wang, Liqun Chen, Long Meng & Yangguang Tian
Publicado en:
2023
Editor:
Springer Nature Singapore
DOI:
10.5281/ZENODO.13383914
Autores:
Liqun Chen∗ Changyu Dong† Nada EL Kassem∗ Christopher J. P. Newton∗ Yalan Wang∗
Publicado en:
2023
Editor:
PQCrypto
DOI:
10.5281/ZENODO.13383969
Autores:
Liqun Chen 0002; Changyu Dong; Nada El Kassem; Christopher J. P. Newton; Yalan Wang
Publicado en:
Lecture Notes in Computer Science - Post-Quantum Cryptography, 2024
Editor:
PQCrypto
DOI:
10.1007/978-3-031-62743-9_2
Autores:
Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi
Publicado en:
ISBN 979-8-4007-0098-9
Editor:
ASIA CCS
DOI:
10.5281/ZENODO.13680169
Autores:
Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen
Publicado en:
Lecture Notes in Computer Science, Cryptology and Network Security, 2023
Editor:
Springer Nature Singapore
DOI:
10.1007/978-981-99-7032-2_25
Autores:
Leonard Tudorache
Editor:
IEEE
DOI:
10.1109/MODELS-C68889.2025.00017
Autores:
Rustem Dautov, Erik Johannes Husom, Sagar Sen, Hui Song
Publicado en:
Position Papers of the 18th Conference on Computer Science and Intelligence Systems, 2023, ISSN 2300-5963
Editor:
ACSIS
DOI:
10.5281/zenodo.13384087
Autores:
Kwan Yin Chan, Liqun Chen, Yangguang Tian, Tsz Hon Yuen
Publicado en:
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Edición Pages 1066 - 1081, 2024, ISBN 979-8-4007-0482-6
Editor:
ACM
DOI:
10.1145/3634737.3656291
Autores:
Rustem Dautov, Erik Johannes Husom
Editor:
IFIP Networking
DOI:
10.5281/ZENODO.13691441
Autores:
Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi
Publicado en:
2023, ISSN 2757-8259
Editor:
C&I at DergiPark
Autores:
Nada El Kassem; Wouter Hellemans; Ioannis Siachos; Edlira Dushku; Stefanos Vasileiadis; Dimitrios S. Karas; Liqun Chen; Constantinos Patsakis and Thanassis Giannetsos
Publicado en:
22nd International Conference on Security and Cryptography SECRYPT, 2025, ISBN 978-989-758-760-3
Editor:
SciTePress
DOI:
10.5220/0013629000003979
Autores:
Rustem Dautov, Hui Song
Editor:
RCIS 2023
DOI:
10.5281/ZENODO.13383930
Autores:
Long Meng and Liqun Chen and Yangguang Tian and Mark Manulis and Suhui Liu
Publicado en:
Preprint, 2024
Editor:
Cryptology ePrint Archive, Paper 2024/986
DOI:
10.5281/zenodo.13383957
Autores:
Heini Bergsson Debes, Thanassis Giannetsos
Publicado en:
2023, ISBN 979-8-4007-0772-8
Editor:
ARES
DOI:
10.5281/ZENODO.13459230
Autores:
Rustem Dautov and Erik Johannes Husom
Publicado en:
PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, 2024, ISBN 979-8-4007-1760-4
Editor:
ACM
DOI:
10.5281/zenodo.13383943
Autores:
Feng Hao, Samiran Bag, Liqun Chen, and Paul C. van Oorschot
Publicado en:
International Conference on Frontier Computing, 2024
Autores:
Sam Afzal-Houshmand, Dimitrios Papamartzivanos, Sajad Homayoun, Entso Veliou, Christian D. Jensen, Athanasios Voulodimos, Thanassis Giannetsos
Publicado en:
ISBN 979-8-3503-4649-7
Editor:
DCOSS-IoT
DOI:
10.5281/ZENODO.13680065
Autores:
Benjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen
Publicado en:
2023
Editor:
IEEE
DOI:
10.1109/TRUSTCOM60117.2023.00146
Autores:
Long Meng and Liqun Chen and Yangguang Tian and Mark Manulis and Suhui Liu
Publicado en:
USENIX Security Symposium 2024, 2024
Editor:
Cryptology ePrint Archive
Autores:
Lwin Khin Shar∗, Arda Goknil†, Erik Johannes Husom‡, Sagar Sen°◊, Yan Naing Tun¢“ and Kisub Kim
Editor:
IEEE
DOI:
10.1109/ASE56229.2023.00094
Autores:
Eren Yildiz, Khakim Akhunov, Lorenzo Antonio Riva, Arda Goknil, Ivan Kurtev, Kasim Sinan Yildirim
Publicado en:
Proceedings of the Nineteenth European Conference on Computer Systems, 2024
Editor:
ACM
DOI:
10.1145/3627703.3650070
Autores:
Rustem Dautov, Erik Johannes Husom
Publicado en:
SEAMS '24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2024, ISBN 979-8-4007-0585-4
Editor:
ACM
DOI:
10.5281/zenodo.13384065
Autores:
Nan Li 0007; Yingjiu Li; Atsuko Miyaji; Yangguang Tian; Tsz Hon Yuen
Publicado en:
Lecture Notes in Computer Science - Cryptology and Network Security, 2023
Editor:
CANS
DOI:
10.1007/978-981-99-7563-1_23
Autores:
Evgenia-Niovi Sassalou; Stefanos Vasileiadis; Stylianos A. Kazazis; Georgia Protogerou; Nikos Varvitsiotis; Dimitrios S. Karas
Publicado en:
2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025, ISBN 979-8-3315-3591-9
Editor:
IEEE
DOI:
10.1109/CSR64739.2025.11130114
Autores:
Konstantinos Loupos
Publicado en:
2025, ISBN 978-1-63828-507-6
Editor:
Now Publishers
DOI:
10.1561/9781638285076
Autores:
Yangguang Tian, Yingjiu Li, Robert H Deng, Guomin Yang, Nan Li
Publicado en:
The Computer Journal, Edición Pages 1814–1825, 2023, ISSN 0010-4620
Editor:
Oxford Academic
DOI:
10.1093/COMJNL/BXAD102
Autores:
Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou
Publicado en:
IEEE Transactions on Information Forensics and Security, Edición 19, 2024, ISSN 1556-6013
Editor:
Institute of Electrical and Electronics Engineers (IEEE)
DOI:
10.1109/TIFS.2023.3340917
Autores:
Suhui Liu , Liquan Chen , Liqun Chen, and Jianchang Lai
Publicado en:
IEEE Transactions on Industrial Informatics, vol. 20, no. 3, pp. 4940-4952, 2024, ISSN 1551-3203
Editor:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TII.2023.3328831
Autores:
Suhui Liu; Liquan Chen; Liqun Chen; Jianchang Lai
Publicado en:
IEEE Transactions on Industrial Informatics, 2024, ISSN 1551-3203
Editor:
Institute of Electrical and Electronics Engineers
DOI:
10.5281/ZENODO.13384052
Autores:
Nan Li, Yingjiu Li, Mark Manulis, Yangguang Tian, Guomin Yang
Publicado en:
The Computer Journal, Edición 67, 2024, ISSN 0010-4620
Editor:
Oxford University Press (OUP)
DOI:
10.1093/COMJNL/BXAE075/7723759
Autores:
Aristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras & Christos Xenakis
Publicado en:
International Journal of Information Security, Edición Volume 23, pages 347–371, 2023, ISSN 1615-5262
Editor:
Springer Verlag
DOI:
10.1007/s10207-023-00741-8
Buscando datos de OpenAIRE...
Se ha producido un error en la búsqueda de datos de OpenAIRE
No hay resultados disponibles