Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Moti Yung, Jian-biao Zhang, Zhen Yang (eds.) |
Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![Springer, 978-3-319-31549-2 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen 0002 |
Attribute-Based Signatures with Controllable Linkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 114-129, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jie Wang 0067, Xiaoxian He |
A Signature Generation Approach Based on Clustering for Polymorphic Worm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 84-96, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto |
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 32-48, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huishan Bian, Liehuang Zhu, Meng Shen 0001, Mingzhong Wang, Chang Xu 0004, Qiongyu Zhang |
Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 3-16, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Veronika Kuchta, Mark Manulis |
Public Key Encryption with Distributed Keyword Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 62-83, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lin Yan, Jian-biao Zhang |
Research on Trusted Bootstrap Based on the Universal Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 169-182, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Antonio de la Piedra |
Efficient Implementation of AND, OR and NOT Operators for ABCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 183-199, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai |
Application of NTRU Using Group Rings to Partial Decryption Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 203-213, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guan Wang, Ziyi Wang, Jian Sun, Jun Zhou |
An Audit Log Protection Mechanism Based on Security Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 226-233, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hui Zhao, Kouichi Sakurai |
Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 99-113, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Li Lin 0008, Jian Ni, Jian Hu, Jian-biao Zhang |
RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 214-225, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Moti Yung, Liehuang Zhu, Yanjiang Yang (eds.) |
Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![Springer, 978-3-319-27997-8 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu |
Universally Composable Oblivious Database in the Presence of Malicious Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 49-61, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu |
Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 17-31, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jiun Yi Yap, Allan Tomlinson |
A Causality-Based Model for Describing the Trustworthiness of a Computing Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 130-149, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Tao, Jun Hu, Jing Zhan, Mo Li, Chunzi Chen |
An Application-Oriented Efficient Encapsulation System for Trusted Software Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, pp. 153-168, 2015, Springer, 978-3-319-31549-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Martin Hell, Linus Karlsson, Ben J. M. Smeets, Jelena Mirosavljevic |
Using TPM Secure Storage in Trusted High Availability Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 243-258, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia |
Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 127-136, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Takashi Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, Kazuo Ohta |
Secure (M+1) st-Price Auction with Automatic Tie-Break. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 422-437, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chao Li, Bo Lang, Jinmiao Wang |
Outsourced KP-ABE with Enhanced Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 36-50, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang |
A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 374-393, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guangjun Fan, Yongbin Zhou, Hailong Zhang 0001, Dengguo Feng |
Template Attacks Based on Priori Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 346-363, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jiaqi Hong, Haixia Xu 0002, Peili Li |
Verifiable Computation of Large Polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 90-104, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhenxin Zhan, Maochao Xu, Shouhuai Xu |
A Characterization of Cybersecurity Posture from Network Telescope Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 105-126, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Li Wang, Hongda Li 0001, Fei Tang |
Functional Signatures from Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 213-227, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Veronika Kuchta, Mark Manulis |
Rerandomizable Threshold Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 70-89, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dan Ding, Guizhen Zhu |
A Simulated Annealing Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 51-69, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chenggen Song, Xin Liu, Yalong Yan |
Efficient Public Key Encryption with Field-Free Conjunctive Keywords Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 394-406, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guangjun Fan, Yongbin Zhou, Hailong Zhang 0001, Dengguo Feng |
How to Choose Interesting Points for Template Attacks More Effectively? ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 168-183, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li |
Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 137-150, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fan Zhang, Liangze Li, Hongfeng Wu |
Faster Pairing Computation on Jacobi Quartic Curves with High-Degree Twists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 310-327, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yan Zhu 0010, Dandan Li, Liguang Yang |
Traitor Tracing Based on Partially-Ordered Hierarchical Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 278-293, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Weiß, Benjamin Weggenmann, Moritz August, Georg Sigl |
On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 151-167, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Anada, Junpei Kawamoto, Jian Weng 0001, Kouichi Sakurai |
Identity-Embedding Method for Decentralized Public-Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 1-14, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xuezhen Huang, Jiqiang Liu, Zhen Han |
A Privacy-Aware Access Model on Anonymized Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 201-212, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Baoping Tian, Fushan Wei, Chuangui Ma |
mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 407-421, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski, Piotr Syga |
Lightweight Protocol for Trusted Spontaneous Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 228-242, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anbang Ruan, Andrew P. Martin |
NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 184-200, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng |
DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 328-345, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wenying Zhang, Jiaqi Zhang, Xiangqian Zheng |
Some Observations on the Lightweight Block Cipher Piccolo-80. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 364-373, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weili Han, Wei Wang, Xinyi Zhang, Weiwei Peng, Zheran Fang |
APP Vetting Based on the Consistency of Description and APK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 259-277, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gaoshou Zhai, Tao Guo, Jie Huang |
SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 294-309, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sampsa Rauti, Samuel Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, Sami Hyrynsalmi, Ville Leppänen |
Diversification of System Calls in Linux Binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, pp. 15-35, 2014, Springer, 978-3-319-27997-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jens Bender, Marc Fischlin, Dennis Kügler |
The PACE|CA Protocol for Machine Readable Travel Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings, pp. 17-35, 2013, Springer, 978-3-319-03490-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Koeberl, Jiangtao Li 0001, Wei Wu 0024 |
A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings, pp. 36-52, 2013, Springer, 978-3-319-03490-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Velten, Sascha Wessel, Frederic Stumpf, Claudia Eckert 0001 |
Active File Integrity Monitoring Using Paravirtualized Filesystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings, pp. 53-69, 2013, Springer, 978-3-319-03490-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jiun Yi Yap, Allan Tomlinson |
Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings, pp. 1-16, 2013, Springer, 978-3-319-03490-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra |
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings, pp. 70-84, 2013, Springer, 978-3-319-03490-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Roderick Bloem, Peter Lipp (eds.) |
Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![Springer, 978-3-319-03490-4 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin |
Towards Policy Engineering for Attribute-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings, pp. 85-102, 2013, Springer, 978-3-319-03490-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen, Moti Yung, Liehuang Zhu (eds.) |
Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![Springer, 978-3-642-32297-6 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mark Dermot Ryan |
Automatic Analysis of Security Properties of the TPM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, pp. 1-4, 2012, Springer, 978-3-642-35370-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christof Paar |
The Yin and Yang Sides of Embedded Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, pp. 112-115, 2012, Springer, 978-3-642-35370-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, pp. 95-111, 2012, Springer, 978-3-642-35370-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nicolai Kuntze, Carsten Rudolph, Janne Paatero |
Establishing Trust between Nodes in Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, pp. 48-62, 2012, Springer, 978-3-642-35370-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra |
A Multi-criteria-Based Evaluation of Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, pp. 67-82, 2012, Springer, 978-3-642-35370-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lukasz Krzywiecki, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, pp. 5-24, 2012, Springer, 978-3-642-35370-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Tillich, Marcin Wójcik |
Security Analysis of an Open Car Immobilizer Protocol Stack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, pp. 83-94, 2012, Springer, 978-3-642-35370-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rodrigo Roman, Javier López 0001 |
Security in the Distributed Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, pp. 65-66, 2012, Springer, 978-3-642-35370-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chris J. Mitchell, Allan Tomlinson (eds.) |
Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![Springer, 978-3-642-35370-3 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peeter Laud |
Secure Implementation of Asynchronous Method Calls and Futures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, pp. 25-47, 2012, Springer, 978-3-642-35370-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shin'ichiro Matsuo |
Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards? ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, pp. 63-64, 2012, Springer, 978-3-642-35370-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dong Hao, Avishek Adhikari, Kouichi Sakurai |
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 239-257, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A (Corrected) DAA Scheme Using Batch Proof and Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 304-337, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qinggang Yue, Feng Liu 0001, Rui Xue 0001 |
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 84-101, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Koeberl, Jiangtao Li 0001, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik |
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 271-288, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng |
A General, Flexible and Efficient Proof of Inclusion and Exclusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 168-183, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yiyuan Luo, Xuejia Lai, Zheng Gong |
Indifferentiability of Domain Extension Modes for Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 138-155, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Miroslaw Kutylowski, Lukasz Krzywiecki, Przemyslaw Kubiak 0001, Michal Koza |
Restricted Identification Scheme and Diffie-Hellman Linking Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 221-238, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Winter, Paul Wiegele, Martin Pirker, Ronald Tögl |
A Flexible Software Development and Emulation Framework for ARM TrustZone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 1-15, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David Derler, Klaus Potzmader, Johannes Winter, Kurt Dietrich |
Anonymous Ticketing for NFC-Enabled Mobile Phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 66-83, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Jämthagen, Martin Hell, Ben J. M. Smeets |
A Technique for Remote Detection of Certain Virtual Machine Monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 129-137, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jan-Erik Ekberg, Sandeep Tamrakar |
Mass Transit Ticketing with NFC Mobile Phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 48-65, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gina Kounga, Liqun Chen 0002 |
Enforcing Sticky Policies with TPM and Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 32-47, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pengqi Cheng, Yan Gu 0011, Zihong Lv, Jianfei Wang, Wenlei Zhu, Zhen Chen, Jiwei Huang |
A Performance Analysis of Identity-Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 289-303, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thouraya Bouabana-Tebibel |
Hash Chains at the Basis of a Secure Reactive Routing Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 258-270, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski |
MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 184-203, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zijian Zhang 0001, Liehuang Zhu, Feng Wang, Lejian Liao, Cong Guo 0001, Hongyuan Wang |
Computationally Sound Symbolic Analysis of EAP-TNC Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 113-128, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chunhua Chen 0002, Chris J. Mitchell, Shaohua Tang |
Building General Purpose Security Services on Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 16-31, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shin'ichiro Matsuo, Daisuke Moriyama, Moti Yung |
Multifactor Authenticated Key Renewal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 204-220, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu Qin, XiaoBo Chu, Dengguo Feng, Wei Feng |
DAA Protocol Analysis and Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 338-350, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kimmo Halunen |
Multicollisions and Graph-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 156-167, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen, Moti Yung (eds.) |
Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![Springer, 978-3-642-25282-2 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wei Li 0013, Dawu Gu, Zhiqiang Liu 0001, Ya Liu 0001, Xiaohu Huang |
Fault Detection of the MacGuffin Cipher against Differential Fault Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, pp. 102-112, 2011, Springer, 978-3-642-32297-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jesse Walker, Jiangtao Li 0001 |
Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 108-127, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yongzhong Zhang, Qi Li, Zhangxi Lin |
A Novel Reputation Computing Model - (Work-in-Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 316-325, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiangmei Song, Shiguang Ju, Changda Wang 0001, Conghua Zhou |
Information Flow Graph: An Approach to Identifying Covert Storage Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 87-97, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Liang Gu, Feng Bao 0001 |
Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 189-199, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan, Tuomas Aura |
Can Hand-Held Computers Still Be Better Smart Cards? ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 200-218, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cornelius Namiluko, Andrew P. Martin |
An Abstract Model of a Trusted Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 47-66, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shangjie Li, Yeping He |
Trusted Subjects Configuration Based on TE Model in MLS Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 98-107, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen, Moti Yung (eds.) |
Trusted Systems, First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![Springer, 978-3-642-14596-4 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Reiter, Georg Neubauer, Michael Kapfenberger, Johannes Winter, Kurt Dietrich |
Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 1-25, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Przemyslaw Blaskiewicz, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 173-188, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dong Hao, Yizhi Ren, Kouichi Sakurai |
A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 237-252, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liang Gu, Yao Guo 0001, Yanjiang Yang, Feng Bao 0001, Hong Mei 0001 |
Modeling TCG-Based Secure Systems with Colored Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 67-86, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Toegl, Martin Pirker, Michael Gissing |
acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 326-345, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ingo Bente, Bastian Hellmann, Jörg Vieweg, Josef von Helden, Arne Welzel |
Interoperable Remote Attestation for VPN Environments - (Work in Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 302-315, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002, Jiangtao Li 0001 |
Revocation of Direct Anonymous Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 128-147, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|