Search dblp for Publications

export results for "toc:db/conf/intrust/intrust2015.bht:"

 download as .bib file

@proceedings{DBLP:conf/intrust/2015,
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31550-8},
  doi          = {10.1007/978-3-319-31550-8},
  isbn         = {978-3-319-31549-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BianZSWXZ15,
  author       = {Huishan Bian and
                  Liehuang Zhu and
                  Meng Shen and
                  Mingzhong Wang and
                  Chang Xu and
                  Qiongyu Zhang},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Privacy-Preserving Anomaly Detection Across Multi-domain for Software
                  Defined Networks},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_1},
  doi          = {10.1007/978-3-319-31550-8\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BianZSWXZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KuchtaM15,
  author       = {Veronika Kuchta and
                  Mark Manulis},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Public Key Encryption with Distributed Keyword Search},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {62--83},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_5},
  doi          = {10.1007/978-3-319-31550-8\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/KuchtaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/LinNHZ15,
  author       = {Li Lin and
                  Jian Ni and
                  Jian Hu and
                  Jian{-}biao Zhang},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {RbacIP: {A} RBAC-Based Method for Intercepting and Processing Malicious
                  Applications in Android Platform},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {214--225},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_14},
  doi          = {10.1007/978-3-319-31550-8\_14},
  timestamp    = {Thu, 20 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/LinNHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Piedra15,
  author       = {Antonio de la Piedra},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Efficient Implementation of AND, {OR} and {NOT} Operators for ABCs},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {183--199},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_12},
  doi          = {10.1007/978-3-319-31550-8\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Piedra15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/TaoHZLC15,
  author       = {Zheng Tao and
                  Jun Hu and
                  Jing Zhan and
                  Mo Li and
                  Chunzi Chen},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {An Application-Oriented Efficient Encapsulation System for Trusted
                  Software Development},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_10},
  doi          = {10.1007/978-3-319-31550-8\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/TaoHZLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/UrquidiKLC15,
  author       = {Miguel Urquidi and
                  Dalia Khader and
                  Jean Lancrenon and
                  Liqun Chen},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Attribute-Based Signatures with Controllable Linkability},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {114--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_8},
  doi          = {10.1007/978-3-319-31550-8\_8},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/UrquidiKLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WangH15,
  author       = {Jie Wang and
                  Xiaoxian He},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {A Signature Generation Approach Based on Clustering for Polymorphic
                  Worm},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_6},
  doi          = {10.1007/978-3-319-31550-8\_6},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/WangH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WangWSZ15,
  author       = {Guan Wang and
                  Ziyi Wang and
                  Jian Sun and
                  Jun Zhou},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {An Audit Log Protection Mechanism Based on Security Chip},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {226--233},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_15},
  doi          = {10.1007/978-3-319-31550-8\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/WangWSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YanZ15,
  author       = {Lin Yan and
                  Jian{-}biao Zhang},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Research on Trusted Bootstrap Based on the Universal Smart Card},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {169--182},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_11},
  doi          = {10.1007/978-3-319-31550-8\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/YanZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YanaiMTNO15,
  author       = {Naoto Yanai and
                  Masahiro Mambo and
                  Kazuma Tanaka and
                  Takashi Nishide and
                  Eiji Okamoto},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Another Look at Aggregate Signatures: Their Capability and Security
                  on Network Graphs},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {32--48},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_3},
  doi          = {10.1007/978-3-319-31550-8\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/YanaiMTNO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YapT15,
  author       = {Jiun Yi Yap and
                  Allan Tomlinson},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {A Causality-Based Model for Describing the Trustworthiness of a Computing
                  Device},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_9},
  doi          = {10.1007/978-3-319-31550-8\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/YapT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YasudaAS15,
  author       = {Takanori Yasuda and
                  Hiroaki Anada and
                  Kouichi Sakurai},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Application of {NTRU} Using Group Rings to Partial Decryption Technique},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {203--213},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_13},
  doi          = {10.1007/978-3-319-31550-8\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/YasudaAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhaoS15,
  author       = {Hui Zhao and
                  Kouichi Sakurai},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Computational Soundness of Uniformity Properties for Multi-party Computation
                  Based on {LSSS}},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {99--113},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_7},
  doi          = {10.1007/978-3-319-31550-8\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhaoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Zhu15,
  author       = {Huafei Zhu},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Distributed Multi-user, Multi-key Searchable Encryptions Resilient
                  Fault Tolerance},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_2},
  doi          = {10.1007/978-3-319-31550-8\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Zhu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Zhu15a,
  author       = {Huafei Zhu},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Universally Composable Oblivious Database in the Presence of Malicious
                  Adversaries},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {49--61},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_4},
  doi          = {10.1007/978-3-319-31550-8\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Zhu15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics