


default search action
2. INTRUST 2010: Beijing, China
- Liqun Chen, Moti Yung:
Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6802, Springer 2011, ISBN 978-3-642-25282-2
Implementation Technology
- Andreas Reiter, Georg Neubauer, Michael Kapfenberger, Johannes Winter, Kurt Dietrich:
Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks. 1-25 - Liangjian Mao, Shuzhen Yao, Kai Zhang, Kouichi Sakurai:
Design and Implementation of Document Access Control Model Based on Role and Security Policy. 26-36 - Jinli Meng, Xinming Chen, Zhen Chen, Chuang Lin, Beipeng Mu, Lingyun Ruan:
Towards High-Performance IPsec on Cavium OCTEON Platform. 37-46
Security Analysis
- Cornelius Namiluko, Andrew P. Martin
:
An Abstract Model of a Trusted Platform. 47-66 - Liang Gu, Yao Guo
, Yanjiang Yang, Feng Bao, Hong Mei:
Modeling TCG-Based Secure Systems with Colored Petri Nets. 67-86 - Xiangmei Song, Shiguang Ju, Changda Wang, Conghua Zhou:
Information Flow Graph: An Approach to Identifying Covert Storage Channels. 87-97 - Shangjie Li, Yeping He:
Trusted Subjects Configuration Based on TE Model in MLS Systems. 98-107
Cryptographic Aspects (I)
- Jesse Walker, Jiangtao Li:
Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol. 108-127 - Liqun Chen
, Jiangtao Li:
Revocation of Direct Anonymous Attestation. 128-147 - Jialin Huang, Xuejia Lai:
Measuring Random Tests by Conditional Entropy and Optimal Execution Order. 148-159
Cryptographic Aspects (II)
- Le Trieu Phong, Shin'ichiro Matsuo, Moti Yung:
Leakage Resilient Strong Key-Insulated Signatures in Public Channel. 160-172 - Przemyslaw Blaskiewicz, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. 173-188 - Yanjiang Yang, Liang Gu, Feng Bao:
Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing. 189-199
Mobile Trusted Systems
- Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan
, Tuomas Aura:
Can Hand-Held Computers Still Be Better Smart Cards? 200-218 - Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy:
TruWalletM: Secure Web Authentication on Mobile Platforms. 219-236 - Dong Hao, Yizhi Ren, Kouichi Sakurai:
A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress). 237-252
Hardware Security
- Jean-François Gallais, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni
, Jörn-Marc Schmidt, Stefan Tillich, Marcin Wójcik:
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software. 253-270 - Kahraman D. Akdemir, Deniz Karakoyunlu, Taskin Padir, Berk Sunar:
An Emerging Threat: Eve Meets a Robot - (Work-in-Progress). 271-289
Attestation
- Tamleek Ali, Mohammad Nauman
, Xinwen Zhang:
On Leveraging Stochastic Models for Remote Attestation. 290-301 - Ingo Bente, Bastian Hellmann, Jörg Vieweg, Josef von Helden, Arne Welzel:
Interoperable Remote Attestation for VPN Environments - (Work in Progress). 302-315 - Yongzhong Zhang, Qi Li, Zhangxi Lin:
A Novel Reputation Computing Model - (Work-in-Progress). 316-325
Software Protection
- Ronald Toegl, Martin Pirker
, Michael Gissing:
acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. 326-345 - Craig S. Wright:
Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure Software. 346-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.