The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "INTRUST"( http://dblp.L3S.de/Venues/INTRUST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/intrust

Publication years (Num. hits)
2009 (16) 2010 (24) 2011 (22) 2012-2013 (19) 2014 (27) 2015 (16) 2016 (1)
Publication types (Num. hits)
inproceedings(118) proceedings(7)
Venues (Conferences, Journals, ...)
INTRUST(125)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 125 publication records. Showing 125 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Moti Yung, Jian-biao Zhang, Zhen Yang (eds.) Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers Search on Bibsonomy INTRUST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen 0002 Attribute-Based Signatures with Controllable Linkability. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jie Wang 0067, Xiaoxian He A Signature Generation Approach Based on Clustering for Polymorphic Worm. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Huishan Bian, Liehuang Zhu, Meng Shen 0001, Mingzhong Wang, Chang Xu 0004, Qiongyu Zhang Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Veronika Kuchta, Mark Manulis Public Key Encryption with Distributed Keyword Search. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lin Yan, Jian-biao Zhang Research on Trusted Bootstrap Based on the Universal Smart Card. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Antonio de la Piedra Efficient Implementation of AND, OR and NOT Operators for ABCs. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai Application of NTRU Using Group Rings to Partial Decryption Technique. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Guan Wang, Ziyi Wang, Jian Sun, Jun Zhou An Audit Log Protection Mechanism Based on Security Chip. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hui Zhao, Kouichi Sakurai Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Li Lin 0008, Jian Ni, Jian Hu, Jian-biao Zhang RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Moti Yung, Liehuang Zhu, Yanjiang Yang (eds.) Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Huafei Zhu Universally Composable Oblivious Database in the Presence of Malicious Adversaries. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Huafei Zhu Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiun Yi Yap, Allan Tomlinson A Causality-Based Model for Describing the Trustworthiness of a Computing Device. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zheng Tao, Jun Hu, Jing Zhan, Mo Li, Chunzi Chen An Application-Oriented Efficient Encapsulation System for Trusted Software Development. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martin Hell, Linus Karlsson, Ben J. M. Smeets, Jelena Mirosavljevic Using TPM Secure Storage in Trusted High Availability Systems. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Takashi Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, Kazuo Ohta Secure (M+1) st-Price Auction with Automatic Tie-Break. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chao Li, Bo Lang, Jinmiao Wang Outsourced KP-ABE with Enhanced Security. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guangjun Fan, Yongbin Zhou, Hailong Zhang 0001, Dengguo Feng Template Attacks Based on Priori Knowledge. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jiaqi Hong, Haixia Xu 0002, Peili Li Verifiable Computation of Large Polynomials. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhenxin Zhan, Maochao Xu, Shouhuai Xu A Characterization of Cybersecurity Posture from Network Telescope Data. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Li Wang, Hongda Li 0001, Fei Tang Functional Signatures from Indistinguishability Obfuscation. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Veronika Kuchta, Mark Manulis Rerandomizable Threshold Blind Signatures. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dan Ding, Guizhen Zhu A Simulated Annealing Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chenggen Song, Xin Liu, Yalong Yan Efficient Public Key Encryption with Field-Free Conjunctive Keywords Search. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guangjun Fan, Yongbin Zhou, Hailong Zhang 0001, Dengguo Feng How to Choose Interesting Points for Template Attacks More Effectively? Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fan Zhang, Liangze Li, Hongfeng Wu Faster Pairing Computation on Jacobi Quartic Curves with High-Degree Twists. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yan Zhu 0010, Dandan Li, Liguang Yang Traitor Tracing Based on Partially-Ordered Hierarchical Encryption. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Weiß, Benjamin Weggenmann, Moritz August, Georg Sigl On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada, Junpei Kawamoto, Jian Weng 0001, Kouichi Sakurai Identity-Embedding Method for Decentralized Public-Key Infrastructure. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xuezhen Huang, Jiqiang Liu, Zhen Han A Privacy-Aware Access Model on Anonymized Data. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Baoping Tian, Fushan Wei, Chuangui Ma mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski, Piotr Syga Lightweight Protocol for Trusted Spontaneous Communication. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anbang Ruan, Andrew P. Martin NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wenying Zhang, Jiaqi Zhang, Xiangqian Zheng Some Observations on the Lightweight Block Cipher Piccolo-80. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weili Han, Wei Wang, Xinyi Zhang, Weiwei Peng, Zheran Fang APP Vetting Based on the Consistency of Description and APK. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gaoshou Zhai, Tao Guo, Jie Huang SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sampsa Rauti, Samuel Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, Sami Hyrynsalmi, Ville Leppänen Diversification of System Calls in Linux Binaries. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jens Bender, Marc Fischlin, Dennis Kügler The PACE|CA Protocol for Machine Readable Travel Documents. Search on Bibsonomy INTRUST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Patrick Koeberl, Jiangtao Li 0001, Wei Wu 0024 A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions. Search on Bibsonomy INTRUST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Velten, Sascha Wessel, Frederic Stumpf, Claudia Eckert 0001 Active File Integrity Monitoring Using Paravirtualized Filesystems. Search on Bibsonomy INTRUST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jiun Yi Yap, Allan Tomlinson Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification. Search on Bibsonomy INTRUST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra Remote Policy Enforcement for Trusted Application Execution in Mobile Environments. Search on Bibsonomy INTRUST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Roderick Bloem, Peter Lipp (eds.) Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings Search on Bibsonomy INTRUST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin Towards Policy Engineering for Attribute-Based Access Control. Search on Bibsonomy INTRUST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Liqun Chen, Moti Yung, Liehuang Zhu (eds.) Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mark Dermot Ryan Automatic Analysis of Security Properties of the TPM. Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christof Paar The Yin and Yang Sides of Embedded Security. Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes. Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nicolai Kuntze, Carsten Rudolph, Janne Paatero Establishing Trust between Nodes in Mobile Ad-Hoc Networks. Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra A Multi-criteria-Based Evaluation of Android Applications. Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lukasz Krzywiecki, Przemyslaw Kubiak 0001, Miroslaw Kutylowski Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Stefan Tillich, Marcin Wójcik Security Analysis of an Open Car Immobilizer Protocol Stack. Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rodrigo Roman, Javier López 0001 Security in the Distributed Internet of Things. Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chris J. Mitchell, Allan Tomlinson (eds.) Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peeter Laud Secure Implementation of Asynchronous Method Calls and Futures. Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shin'ichiro Matsuo Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards? Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dong Hao, Avishek Adhikari, Kouichi Sakurai Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 A (Corrected) DAA Scheme Using Batch Proof and Verification. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qinggang Yue, Feng Liu 0001, Rui Xue 0001 Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Patrick Koeberl, Jiangtao Li 0001, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kun Peng A General, Flexible and Efficient Proof of Inclusion and Exclusion. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yiyuan Luo, Xuejia Lai, Zheng Gong Indifferentiability of Domain Extension Modes for Hash Functions. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Miroslaw Kutylowski, Lukasz Krzywiecki, Przemyslaw Kubiak 0001, Michal Koza Restricted Identification Scheme and Diffie-Hellman Linking Problem. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Johannes Winter, Paul Wiegele, Martin Pirker, Ronald Tögl A Flexible Software Development and Emulation Framework for ARM TrustZone. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David Derler, Klaus Potzmader, Johannes Winter, Kurt Dietrich Anonymous Ticketing for NFC-Enabled Mobile Phones. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christopher Jämthagen, Martin Hell, Ben J. M. Smeets A Technique for Remote Detection of Certain Virtual Machine Monitors. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jan-Erik Ekberg, Sandeep Tamrakar Mass Transit Ticketing with NFC Mobile Phones. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gina Kounga, Liqun Chen 0002 Enforcing Sticky Policies with TPM and Virtualization. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pengqi Cheng, Yan Gu 0011, Zihong Lv, Jianfei Wang, Wenlei Zhu, Zhen Chen, Jiwei Huang A Performance Analysis of Identity-Based Encryption Schemes. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thouraya Bouabana-Tebibel Hash Chains at the Basis of a Secure Reactive Routing Protocol. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zijian Zhang 0001, Liehuang Zhu, Feng Wang, Lejian Liao, Cong Guo 0001, Hongyuan Wang Computationally Sound Symbolic Analysis of EAP-TNC Protocol. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chunhua Chen 0002, Chris J. Mitchell, Shaohua Tang Building General Purpose Security Services on Trusted Computing. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shin'ichiro Matsuo, Daisuke Moriyama, Moti Yung Multifactor Authenticated Key Renewal. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu Qin, XiaoBo Chu, Dengguo Feng, Wei Feng DAA Protocol Analysis and Verification. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kimmo Halunen Multicollisions and Graph-Based Hash Functions. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Liqun Chen, Moti Yung (eds.) Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wei Li 0013, Dawu Gu, Zhiqiang Liu 0001, Ya Liu 0001, Xiaohu Huang Fault Detection of the MacGuffin Cipher against Differential Fault Attack. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jesse Walker, Jiangtao Li 0001 Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol. Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yongzhong Zhang, Qi Li, Zhangxi Lin A Novel Reputation Computing Model - (Work-in-Progress). Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xiangmei Song, Shiguang Ju, Changda Wang 0001, Conghua Zhou Information Flow Graph: An Approach to Identifying Covert Storage Channels. Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yanjiang Yang, Liang Gu, Feng Bao 0001 Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing. Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan, Tuomas Aura Can Hand-Held Computers Still Be Better Smart Cards? Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Cornelius Namiluko, Andrew P. Martin An Abstract Model of a Trusted Platform. Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shangjie Li, Yeping He Trusted Subjects Configuration Based on TE Model in MLS Systems. Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Liqun Chen, Moti Yung (eds.) Trusted Systems, First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Andreas Reiter, Georg Neubauer, Michael Kapfenberger, Johannes Winter, Kurt Dietrich Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks. Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Przemyslaw Blaskiewicz, Przemyslaw Kubiak 0001, Miroslaw Kutylowski Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dong Hao, Yizhi Ren, Kouichi Sakurai A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress). Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Liang Gu, Yao Guo 0001, Yanjiang Yang, Feng Bao 0001, Hong Mei 0001 Modeling TCG-Based Secure Systems with Colored Petri Nets. Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ronald Toegl, Martin Pirker, Michael Gissing acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ingo Bente, Bastian Hellmann, Jörg Vieweg, Josef von Helden, Arne Welzel Interoperable Remote Attestation for VPN Environments - (Work in Progress). Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002, Jiangtao Li 0001 Revocation of Direct Anonymous Attestation. Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 125 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license