


default search action
1. INTRUST 2009: Beijing, China
- Liqun Chen, Moti Yung:

Trusted Systems, First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers. Lecture Notes in Computer Science 6163, Springer 2010, ISBN 978-3-642-14596-4
Invited Talk
- Wenchang Shi:

On Design of a Trusted Software Base with Support of TPCM. 1-15
Secure Storage
- Jan-Erik Ekberg, N. Asokan

:
External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing. 16-38 - T. Paul Parker, Shouhuai Xu:

A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks. 39-59
Attestation
- Liang Gu, Yueqiang Cheng, Xuhua Ding

, Robert H. Deng
, Yao Guo
, Weizhong Shao:
Remote Attestation on Function Execution (Work-in-Progress). 60-72 - Tamleek Ali Tanveer, Masoom Alam, Mohammad Nauman

:
Scalable Remote Attestation with Privacy Protection. 73-87 - Kurt Dietrich:

Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation. 88-103
Trusted Network
- Shouhuai Xu, Moti Yung:

SocialClouds: Concept, Security Architecture and Some Mechanisms. 104-128 - Ingo Bente, Jörg Vieweg, Josef von Helden:

Privacy Enhanced Trusted Network Connect. 129-145 - Mengmeng Li, Yong Zhao:

Research on Multistage Interconnection Architecture and Collision Detection Model. 146-155
Virtualization
- Luigi Catuogno

, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan:
Trusted Virtual Domains - Design, Implementation and Lessons Learned. 156-179 - Serdar Cabuk, Liqun Chen

, David Plaquin, Mark Ryan
:
Trusted Integrity Measurement and Reporting for Virtualized Platforms. 180-196
Applications
- Jianhua Liao, Yong Zhao, Changxiang Shen:

A Feather-Weight Application Isolation Model. 197-211 - Zheng Yan

, Yan Dong, Valtteri Niemi, Guoliang Yu:
Exploring Trust of Mobile Applications Based on User Behaviors. 212-226 - Zhen-Long Du, Xiaoli Li, Kangkang Shen:

Trusted Firmware Services Based on TPM. 227-235
Supporting Technology
- Zhongming Wu, Yiyuan Luo, Xuejia Lai, Bo Zhu:

Improved Cryptanalysis of the FOX Block Cipher. 236-249 - Bo Zhu, Kefei Chen, Xuejia Lai:

Bitwise Higher Order Differential Cryptanalysis. 250-262

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














