


default search action
2. INTRUST 2010: Beijing, China
- Liqun Chen, Moti Yung:

Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6802, Springer 2011, ISBN 978-3-642-25282-2
Implementation Technology
- Andreas Reiter, Georg Neubauer, Michael Kapfenberger, Johannes Winter, Kurt Dietrich:

Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks. 1-25 - Liangjian Mao, Shuzhen Yao, Kai Zhang, Kouichi Sakurai:

Design and Implementation of Document Access Control Model Based on Role and Security Policy. 26-36 - Jinli Meng, Xinming Chen, Zhen Chen, Chuang Lin, Beipeng Mu, Lingyun Ruan:

Towards High-Performance IPsec on Cavium OCTEON Platform. 37-46
Security Analysis
- Cornelius Namiluko, Andrew P. Martin

:
An Abstract Model of a Trusted Platform. 47-66 - Liang Gu, Yao Guo

, Yanjiang Yang, Feng Bao, Hong Mei:
Modeling TCG-Based Secure Systems with Colored Petri Nets. 67-86 - Xiangmei Song, Shiguang Ju, Changda Wang, Conghua Zhou:

Information Flow Graph: An Approach to Identifying Covert Storage Channels. 87-97 - Shangjie Li, Yeping He:

Trusted Subjects Configuration Based on TE Model in MLS Systems. 98-107
Cryptographic Aspects (I)
- Jesse Walker, Jiangtao Li:

Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol. 108-127 - Liqun Chen

, Jiangtao Li:
Revocation of Direct Anonymous Attestation. 128-147 - Jialin Huang, Xuejia Lai:

Measuring Random Tests by Conditional Entropy and Optimal Execution Order. 148-159
Cryptographic Aspects (II)
- Le Trieu Phong, Shin'ichiro Matsuo, Moti Yung:

Leakage Resilient Strong Key-Insulated Signatures in Public Channel. 160-172 - Przemyslaw Blaskiewicz, Przemyslaw Kubiak

, Miroslaw Kutylowski:
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. 173-188 - Yanjiang Yang, Liang Gu, Feng Bao:

Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing. 189-199
Mobile Trusted Systems
- Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan

, Tuomas Aura:
Can Hand-Held Computers Still Be Better Smart Cards? 200-218 - Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy:

TruWalletM: Secure Web Authentication on Mobile Platforms. 219-236 - Dong Hao, Yizhi Ren, Kouichi Sakurai:

A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress). 237-252
Hardware Security
- Jean-François Gallais, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni

, Jörn-Marc Schmidt, Stefan Tillich, Marcin Wójcik:
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software. 253-270 - Kahraman D. Akdemir, Deniz Karakoyunlu, Taskin Padir, Berk Sunar:

An Emerging Threat: Eve Meets a Robot - (Work-in-Progress). 271-289
Attestation
- Tamleek Ali, Mohammad Nauman

, Xinwen Zhang:
On Leveraging Stochastic Models for Remote Attestation. 290-301 - Ingo Bente, Bastian Hellmann, Jörg Vieweg, Josef von Helden, Arne Welzel:

Interoperable Remote Attestation for VPN Environments - (Work in Progress). 302-315 - Yongzhong Zhang, Qi Li, Zhangxi Lin:

A Novel Reputation Computing Model - (Work-in-Progress). 316-325
Software Protection
- Ronald Toegl, Martin Pirker

, Michael Gissing:
acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. 326-345 - Craig S. Wright:

Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure Software. 346-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














