


default search action
3. INTRUST 2011: Beijing, China
- Liqun Chen, Moti Yung, Liehuang Zhu:

Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7222, Springer 2012, ISBN 978-3-642-32297-6
Trusted Services
- Johannes Winter, Paul Wiegele, Martin Pirker

, Ronald Tögl:
A Flexible Software Development and Emulation Framework for ARM TrustZone. 1-15 - Chunhua Chen, Chris J. Mitchell

, Shaohua Tang:
Building General Purpose Security Services on Trusted Computing. 16-31 - Gina Kounga, Liqun Chen

:
Enforcing Sticky Policies with TPM and Virtualization. 32-47
Mobile Trusted Systems
- Jan-Erik Ekberg, Sandeep Tamrakar:

Mass Transit Ticketing with NFC Mobile Phones. 48-65 - David Derler

, Klaus Potzmader, Johannes Winter, Kurt Dietrich:
Anonymous Ticketing for NFC-Enabled Mobile Phones. 66-83
Security Analysis
- Qinggang Yue, Feng Liu, Rui Xue:

Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks. 84-101 - Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, Xiaohu Huang:

Fault Detection of the MacGuffin Cipher against Differential Fault Attack. 102-112 - Zijian Zhang, Liehuang Zhu, Feng Wang, Lejian Liao, Cong Guo, Hongyuan Wang:

Computationally Sound Symbolic Analysis of EAP-TNC Protocol. 113-128 - Christopher Jämthagen, Martin Hell

, Ben J. M. Smeets:
A Technique for Remote Detection of Certain Virtual Machine Monitors. 129-137
Cryptographic Aspects
- Yiyuan Luo, Xuejia Lai, Zheng Gong:

Indifferentiability of Domain Extension Modes for Hash Functions. 138-155 - Kimmo Halunen:

Multicollisions and Graph-Based Hash Functions. 156-167 - Kun Peng:

A General, Flexible and Efficient Proof of Inclusion and Exclusion. 168-183 - Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski:

MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme. 184-203 - Shin'ichiro Matsuo, Daisuke Moriyama, Moti Yung:

Multifactor Authenticated Key Renewal. 204-220 - Miroslaw Kutylowski, Lukasz Krzywiecki

, Przemyslaw Kubiak
, Michal Koza:
Restricted Identification Scheme and Diffie-Hellman Linking Problem. 221-238
Trusted Networks
- Dong Hao, Avishek Adhikari, Kouichi Sakurai:

Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks. 239-257 - Thouraya Bouabana-Tebibel:

Hash Chains at the Basis of a Secure Reactive Routing Protocol. 258-270
Implementation
- Patrick Koeberl, Jiangtao Li, Roel Maes

, Anand Rajan, Claire Vishik, Marcin Wójcik:
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM. 271-288 - Pengqi Cheng, Yan Gu, Zihong Lv, Jianfei Wang, Wenlei Zhu, Zhen Chen, Jiwei Huang:

A Performance Analysis of Identity-Based Encryption Schemes. 289-303
Direct Anonymous Attestation
- Ernie Brickell, Liqun Chen

, Jiangtao Li:
A (Corrected) DAA Scheme Using Batch Proof and Verification. 304-337 - Yu Qin, XiaoBo Chu, Dengguo Feng, Wei Feng:

DAA Protocol Analysis and Verification. 338-350

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














