Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/intrust:"
@proceedings{DBLP:conf/intrust/2015, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31550-8}, doi = {10.1007/978-3-319-31550-8}, isbn = {978-3-319-31549-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/BianZSWXZ15, author = {Huishan Bian and Liehuang Zhu and Meng Shen and Mingzhong Wang and Chang Xu and Qiongyu Zhang}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {3--16}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_1}, doi = {10.1007/978-3-319-31550-8\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/BianZSWXZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/KuchtaM15, author = {Veronika Kuchta and Mark Manulis}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Public Key Encryption with Distributed Keyword Search}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {62--83}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_5}, doi = {10.1007/978-3-319-31550-8\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/KuchtaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/LinNHZ15, author = {Li Lin and Jian Ni and Jian Hu and Jian{-}biao Zhang}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {RbacIP: {A} RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {214--225}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_14}, doi = {10.1007/978-3-319-31550-8\_14}, timestamp = {Thu, 20 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/LinNHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Piedra15, author = {Antonio de la Piedra}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Efficient Implementation of AND, {OR} and {NOT} Operators for ABCs}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {183--199}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_12}, doi = {10.1007/978-3-319-31550-8\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Piedra15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/TaoHZLC15, author = {Zheng Tao and Jun Hu and Jing Zhan and Mo Li and Chunzi Chen}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {An Application-Oriented Efficient Encapsulation System for Trusted Software Development}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {153--168}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_10}, doi = {10.1007/978-3-319-31550-8\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/TaoHZLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/UrquidiKLC15, author = {Miguel Urquidi and Dalia Khader and Jean Lancrenon and Liqun Chen}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Attribute-Based Signatures with Controllable Linkability}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {114--129}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_8}, doi = {10.1007/978-3-319-31550-8\_8}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/UrquidiKLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WangH15, author = {Jie Wang and Xiaoxian He}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {A Signature Generation Approach Based on Clustering for Polymorphic Worm}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {84--96}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_6}, doi = {10.1007/978-3-319-31550-8\_6}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/WangH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WangWSZ15, author = {Guan Wang and Ziyi Wang and Jian Sun and Jun Zhou}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {An Audit Log Protection Mechanism Based on Security Chip}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {226--233}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_15}, doi = {10.1007/978-3-319-31550-8\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/WangWSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/YanZ15, author = {Lin Yan and Jian{-}biao Zhang}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Research on Trusted Bootstrap Based on the Universal Smart Card}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {169--182}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_11}, doi = {10.1007/978-3-319-31550-8\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/YanZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/YanaiMTNO15, author = {Naoto Yanai and Masahiro Mambo and Kazuma Tanaka and Takashi Nishide and Eiji Okamoto}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {32--48}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_3}, doi = {10.1007/978-3-319-31550-8\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/YanaiMTNO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/YapT15, author = {Jiun Yi Yap and Allan Tomlinson}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {A Causality-Based Model for Describing the Trustworthiness of a Computing Device}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {130--149}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_9}, doi = {10.1007/978-3-319-31550-8\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/YapT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/YasudaAS15, author = {Takanori Yasuda and Hiroaki Anada and Kouichi Sakurai}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Application of {NTRU} Using Group Rings to Partial Decryption Technique}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {203--213}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_13}, doi = {10.1007/978-3-319-31550-8\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/YasudaAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhaoS15, author = {Hui Zhao and Kouichi Sakurai}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Computational Soundness of Uniformity Properties for Multi-party Computation Based on {LSSS}}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {99--113}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_7}, doi = {10.1007/978-3-319-31550-8\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ZhaoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Zhu15, author = {Huafei Zhu}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {17--31}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_2}, doi = {10.1007/978-3-319-31550-8\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Zhu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Zhu15a, author = {Huafei Zhu}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Universally Composable Oblivious Database in the Presence of Malicious Adversaries}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {49--61}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_4}, doi = {10.1007/978-3-319-31550-8\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Zhu15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2014, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27998-5}, doi = {10.1007/978-3-319-27998-5}, isbn = {978-3-319-27997-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/AnadaKWS14, author = {Hiroaki Anada and Junpei Kawamoto and Jian Weng and Kouichi Sakurai}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Identity-Embedding Method for Decentralized Public-Key Infrastructure}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {1--14}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_1}, doi = {10.1007/978-3-319-27998-5\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/AnadaKWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/BlaskiewiczKKS14, author = {Przemyslaw Blaskiewicz and Marek Klonowski and Miroslaw Kutylowski and Piotr Syga}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Lightweight Protocol for Trusted Spontaneous Communication}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {228--242}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_15}, doi = {10.1007/978-3-319-27998-5\_15}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/BlaskiewiczKKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/DingZ14, author = {Dan Ding and Guizhen Zhu}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {A Simulated Annealing Algorithm for {SVP} Challenge Through y-Sparse Representations of Short Lattice Vectors}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {51--69}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_4}, doi = {10.1007/978-3-319-27998-5\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/DingZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/FanZZF14, author = {Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {How to Choose Interesting Points for Template Attacks More Effectively?}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {168--183}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_11}, doi = {10.1007/978-3-319-27998-5\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/FanZZF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/FanZZF14a, author = {Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Template Attacks Based on Priori Knowledge}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {346--363}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_22}, doi = {10.1007/978-3-319-27998-5\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/FanZZF14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/GuoMLX14, author = {Hua Guo and Fangchao Ma and Zhoujun Li and Chunhe Xia}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {127--136}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_8}, doi = {10.1007/978-3-319-27998-5\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/GuoMLX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/HanWZPF14, author = {Weili Han and Wei Wang and Xinyi Zhang and Weiwei Peng and Zheran Fang}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {{APP} Vetting Based on the Consistency of Description and {APK}}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {259--277}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_17}, doi = {10.1007/978-3-319-27998-5\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/HanWZPF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/HellKSM14, author = {Martin Hell and Linus Karlsson and Ben J. M. Smeets and Jelena Mirosavljevic}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Using {TPM} Secure Storage in Trusted High Availability Systems}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {243--258}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_16}, doi = {10.1007/978-3-319-27998-5\_16}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/HellKSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/HongXL14, author = {Jiaqi Hong and Haixia Xu and Peili Li}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Verifiable Computation of Large Polynomials}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {90--104}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_6}, doi = {10.1007/978-3-319-27998-5\_6}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/HongXL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/HuangHCCY14, author = {Yun{-}Ju Huang and Wei{-}Chih Hong and Chen{-}Mou Cheng and Jiun{-}Ming Chen and Bo{-}Yin Yang}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {A Memory Efficient Variant of an Implementation of the {F} {\_}4 Algorithm for Computing Gr{\"{o}}bner Bases}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {374--393}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_24}, doi = {10.1007/978-3-319-27998-5\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/HuangHCCY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/HuangLH14, author = {Xuezhen Huang and Jiqiang Liu and Zhen Han}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {A Privacy-Aware Access Model on Anonymized Data}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {201--212}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_13}, doi = {10.1007/978-3-319-27998-5\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/HuangLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/KuchtaM14, author = {Veronika Kuchta and Mark Manulis}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Rerandomizable Threshold Blind Signatures}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {70--89}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_5}, doi = {10.1007/978-3-319-27998-5\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/KuchtaM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/LiLW14, author = {Chao Li and Bo Lang and Jinmiao Wang}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Outsourced {KP-ABE} with Enhanced Security}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {36--50}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_3}, doi = {10.1007/978-3-319-27998-5\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/LiLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/NishideIIO14, author = {Takashi Nishide and Mitsugu Iwamoto and Atsushi Iwasaki and Kazuo Ohta}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Secure {(M+1)} st-Price Auction with Automatic Tie-Break}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {422--437}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_27}, doi = {10.1007/978-3-319-27998-5\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/NishideIIO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/RautiLHMHL14, author = {Sampsa Rauti and Samuel Laur{\'{e}}n and Shohreh Hosseinzadeh and Jari{-}Matti M{\"{a}}kel{\"{a}} and Sami Hyrynsalmi and Ville Lepp{\"{a}}nen}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Diversification of System Calls in Linux Binaries}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {15--35}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_2}, doi = {10.1007/978-3-319-27998-5\_2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/RautiLHMHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/RuanM14, author = {Anbang Ruan and Andrew P. Martin}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {184--200}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_12}, doi = {10.1007/978-3-319-27998-5\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/RuanM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/SongLY14, author = {Chenggen Song and Xin Liu and Yalong Yan}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Efficient Public Key Encryption with Field-Free Conjunctive Keywords Search}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {394--406}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_25}, doi = {10.1007/978-3-319-27998-5\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/SongLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/TianWM14, author = {Baoping Tian and Fushan Wei and Chuangui Ma}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over {RSA} Group}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {407--421}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_26}, doi = {10.1007/978-3-319-27998-5\_26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/TianWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WangLT14, author = {Li Wang and Hongda Li and Fei Tang}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Functional Signatures from Indistinguishability Obfuscation}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {213--227}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_14}, doi = {10.1007/978-3-319-27998-5\_14}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/WangLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WeissWAS14, author = {Michael Wei{\ss} and Benjamin Weggenmann and Moritz August and Georg Sigl}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {151--167}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_10}, doi = {10.1007/978-3-319-27998-5\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/WeissWAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/XueZHRL14, author = {Jingfeng Xue and Yan Zhang and Changzhen Hu and Hongyu Ren and Zhiqiang Li}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {137--150}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_9}, doi = {10.1007/978-3-319-27998-5\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/XueZHRL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhaiGH14, author = {Gaoshou Zhai and Tao Guo and Jie Huang}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {SCIATool: {A} Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {294--309}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_19}, doi = {10.1007/978-3-319-27998-5\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ZhaiGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhanXX14, author = {Zhenxin Zhan and Maochao Xu and Shouhuai Xu}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {A Characterization of Cybersecurity Posture from Network Telescope Data}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {105--126}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_7}, doi = {10.1007/978-3-319-27998-5\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ZhanXX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhangLW14, author = {Fan Zhang and Liangze Li and Hongfeng Wu}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Faster Pairing Computation on Jacobi Quartic Curves with High-Degree Twists}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {310--327}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_20}, doi = {10.1007/978-3-319-27998-5\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ZhangLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhangZZ14, author = {Wenying Zhang and Jiaqi Zhang and Xiangqian Zheng}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Some Observations on the Lightweight Block Cipher Piccolo-80}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {364--373}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_23}, doi = {10.1007/978-3-319-27998-5\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ZhangZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhuLY14, author = {Yan Zhu and Dandan Li and Liguang Yang}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Traitor Tracing Based on Partially-Ordered Hierarchical Encryption}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {278--293}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_18}, doi = {10.1007/978-3-319-27998-5\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/ZhuLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhuTYLM14, author = {Min Zhu and Bibo Tu and Ruibang You and Yanzhao Li and Dan Meng}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {328--345}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_21}, doi = {10.1007/978-3-319-27998-5\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ZhuTYLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/BenderFK13, author = {Jens Bender and Marc Fischlin and Dennis K{\"{u}}gler}, editor = {Roderick Bloem and Peter Lipp}, title = {The PACE{\(\vert\)}CA Protocol for Machine Readable Travel Documents}, booktitle = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz, Austria, December 4-5, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8292}, pages = {17--35}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03491-1\_2}, doi = {10.1007/978-3-319-03491-1\_2}, timestamp = {Mon, 03 Jan 2022 22:38:23 +0100}, biburl = {https://dblp.org/rec/conf/intrust/BenderFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Koeberl0W13, author = {Patrick Koeberl and Jiangtao Li and Wei Wu}, editor = {Roderick Bloem and Peter Lipp}, title = {A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions}, booktitle = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz, Austria, December 4-5, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8292}, pages = {36--52}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03491-1\_3}, doi = {10.1007/978-3-319-03491-1\_3}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/Koeberl0W13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/KrautsevichLMY13, author = {Leanid Krautsevich and Aliaksandr Lazouski and Fabio Martinelli and Artsiom Yautsiukhin}, editor = {Roderick Bloem and Peter Lipp}, title = {Towards Policy Engineering for Attribute-Based Access Control}, booktitle = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz, Austria, December 4-5, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8292}, pages = {85--102}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03491-1\_6}, doi = {10.1007/978-3-319-03491-1\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/KrautsevichLMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/MartinelliMSS13, author = {Fabio Martinelli and Ilaria Matteucci and Andrea Saracino and Daniele Sgandurra}, editor = {Roderick Bloem and Peter Lipp}, title = {Remote Policy Enforcement for Trusted Application Execution in Mobile Environments}, booktitle = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz, Austria, December 4-5, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8292}, pages = {70--84}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03491-1\_5}, doi = {10.1007/978-3-319-03491-1\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/MartinelliMSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/VeltenWSE13, author = {Michael Velten and Sascha Wessel and Frederic Stumpf and Claudia Eckert}, editor = {Roderick Bloem and Peter Lipp}, title = {Active File Integrity Monitoring Using Paravirtualized Filesystems}, booktitle = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz, Austria, December 4-5, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8292}, pages = {53--69}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03491-1\_4}, doi = {10.1007/978-3-319-03491-1\_4}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/VeltenWSE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/YapT13, author = {Jiun Yi Yap and Allan Tomlinson}, editor = {Roderick Bloem and Peter Lipp}, title = {Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification}, booktitle = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz, Austria, December 4-5, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8292}, pages = {1--16}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03491-1\_1}, doi = {10.1007/978-3-319-03491-1\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/YapT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2013, editor = {Roderick Bloem and Peter Lipp}, title = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz, Austria, December 4-5, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8292}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03491-1}, doi = {10.1007/978-3-319-03491-1}, isbn = {978-3-319-03490-4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/BrickellCL12, author = {Ernie Brickell and Liqun Chen and Jiangtao Li}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {95--111}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_9}, doi = {10.1007/978-3-642-35371-0\_9}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/BrickellCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/DiniMMPSS12, author = {Gianluca Dini and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi and Andrea Saracino and Daniele Sgandurra}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {A Multi-criteria-Based Evaluation of Android Applications}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {67--82}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_7}, doi = {10.1007/978-3-642-35371-0\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/DiniMMPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/KrzywieckiKK12, author = {Lukasz Krzywiecki and Przemyslaw Kubiak and Miroslaw Kutylowski}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {5--24}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_2}, doi = {10.1007/978-3-642-35371-0\_2}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/KrzywieckiKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/KuntzeRP12, author = {Nicolai Kuntze and Carsten Rudolph and Janne Paatero}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {Establishing Trust between Nodes in Mobile Ad-Hoc Networks}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {48--62}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_4}, doi = {10.1007/978-3-642-35371-0\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/KuntzeRP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Laud12, author = {Peeter Laud}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {Secure Implementation of Asynchronous Method Calls and Futures}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {25--47}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_3}, doi = {10.1007/978-3-642-35371-0\_3}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Laud12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Matsuo12, author = {Shin'ichiro Matsuo}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards?}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {63--64}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_5}, doi = {10.1007/978-3-642-35371-0\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Matsuo12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Paar12, author = {Christof Paar}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {The Yin and Yang Sides of Embedded Security}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {112--115}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_10}, doi = {10.1007/978-3-642-35371-0\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Paar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/RomanL12, author = {Rodrigo Roman and Javier L{\'{o}}pez}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {Security in the Distributed Internet of Things}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {65--66}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_6}, doi = {10.1007/978-3-642-35371-0\_6}, timestamp = {Thu, 04 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/RomanL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Ryan12, author = {Mark Dermot Ryan}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {Automatic Analysis of Security Properties of the {TPM}}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {1--4}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_1}, doi = {10.1007/978-3-642-35371-0\_1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/Ryan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/TillichW12, author = {Stefan Tillich and Marcin W{\'{o}}jcik}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {Security Analysis of an Open Car Immobilizer Protocol Stack}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {83--94}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_8}, doi = {10.1007/978-3-642-35371-0\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/TillichW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2011, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32298-3}, doi = {10.1007/978-3-642-32298-3}, isbn = {978-3-642-32297-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2012, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0}, doi = {10.1007/978-3-642-35371-0}, isbn = {978-3-642-35370-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Bouabana-Tebibel11, author = {Thouraya Bouabana{-}Tebibel}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Hash Chains at the Basis of a Secure Reactive Routing Protocol}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {258--270}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_17}, doi = {10.1007/978-3-642-32298-3\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Bouabana-Tebibel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/BrickellCL11, author = {Ernie Brickell and Liqun Chen and Jiangtao Li}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {A (Corrected) {DAA} Scheme Using Batch Proof and Verification}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {304--337}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_20}, doi = {10.1007/978-3-642-32298-3\_20}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/BrickellCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ChenMT11, author = {Chunhua Chen and Chris J. Mitchell and Shaohua Tang}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Building General Purpose Security Services on Trusted Computing}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {16--31}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_2}, doi = {10.1007/978-3-642-32298-3\_2}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ChenMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ChengGLWZCH11, author = {Pengqi Cheng and Yan Gu and Zihong Lv and Jianfei Wang and Wenlei Zhu and Zhen Chen and Jiwei Huang}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {A Performance Analysis of Identity-Based Encryption Schemes}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {289--303}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_19}, doi = {10.1007/978-3-642-32298-3\_19}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/ChengGLWZCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/DerlerPWD11, author = {David Derler and Klaus Potzmader and Johannes Winter and Kurt Dietrich}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Anonymous Ticketing for NFC-Enabled Mobile Phones}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {66--83}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_5}, doi = {10.1007/978-3-642-32298-3\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/DerlerPWD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/EkbergT11, author = {Jan{-}Erik Ekberg and Sandeep Tamrakar}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Mass Transit Ticketing with {NFC} Mobile Phones}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {48--65}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_4}, doi = {10.1007/978-3-642-32298-3\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/EkbergT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/GligoroskiOJPFKM11, author = {Danilo Gligoroski and Rune Steinsmo {\O}deg{\aa}rd and Rune Erlend Jensen and Ludovic Perret and Jean{-}Charles Faug{\`{e}}re and Svein Johan Knapskog and Smile Markovski}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {{MQQ-SIG} - An Ultra-Fast and Provably {CMA} Resistant Digital Signature Scheme}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {184--203}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_13}, doi = {10.1007/978-3-642-32298-3\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/GligoroskiOJPFKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Halunen11, author = {Kimmo Halunen}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Multicollisions and Graph-Based Hash Functions}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {156--167}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_11}, doi = {10.1007/978-3-642-32298-3\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Halunen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/HaoAS11, author = {Dong Hao and Avishek Adhikari and Kouichi Sakurai}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {239--257}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_16}, doi = {10.1007/978-3-642-32298-3\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/HaoAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/JamthagenHS11, author = {Christopher J{\"{a}}mthagen and Martin Hell and Ben J. M. Smeets}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {A Technique for Remote Detection of Certain Virtual Machine Monitors}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {129--137}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_9}, doi = {10.1007/978-3-642-32298-3\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/JamthagenHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/KoeberlLMRVW11, author = {Patrick Koeberl and Jiangtao Li and Roel Maes and Anand Rajan and Claire Vishik and Marcin W{\'{o}}jcik}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Evaluation of a {PUF} Device Authentication Scheme on a Discrete 0.13um {SRAM}}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {271--288}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_18}, doi = {10.1007/978-3-642-32298-3\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/KoeberlLMRVW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/KoungaC11, author = {Gina Kounga and Liqun Chen}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Enforcing Sticky Policies with {TPM} and Virtualization}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {32--47}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_3}, doi = {10.1007/978-3-642-32298-3\_3}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/KoungaC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/KutylowskiKKK11, author = {Miroslaw Kutylowski and Lukasz Krzywiecki and Przemyslaw Kubiak and Michal Koza}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Restricted Identification Scheme and Diffie-Hellman Linking Problem}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {221--238}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_15}, doi = {10.1007/978-3-642-32298-3\_15}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/KutylowskiKKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/LiGLLH11, author = {Wei Li and Dawu Gu and Zhiqiang Liu and Ya Liu and Xiaohu Huang}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Fault Detection of the MacGuffin Cipher against Differential Fault Attack}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {102--112}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_7}, doi = {10.1007/978-3-642-32298-3\_7}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/LiGLLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/LuoLG11, author = {Yiyuan Luo and Xuejia Lai and Zheng Gong}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Indifferentiability of Domain Extension Modes for Hash Functions}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {138--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_10}, doi = {10.1007/978-3-642-32298-3\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/LuoLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/MatsuoMY11, author = {Shin'ichiro Matsuo and Daisuke Moriyama and Moti Yung}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Multifactor Authenticated Key Renewal}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {204--220}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_14}, doi = {10.1007/978-3-642-32298-3\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/MatsuoMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Peng11, author = {Kun Peng}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {A General, Flexible and Efficient Proof of Inclusion and Exclusion}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {168--183}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_12}, doi = {10.1007/978-3-642-32298-3\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/QinCFF11, author = {Yu Qin and XiaoBo Chu and Dengguo Feng and Wei Feng}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {{DAA} Protocol Analysis and Verification}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {338--350}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_21}, doi = {10.1007/978-3-642-32298-3\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/QinCFF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WinterWPT11, author = {Johannes Winter and Paul Wiegele and Martin Pirker and Ronald T{\"{o}}gl}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {A Flexible Software Development and Emulation Framework for {ARM} TrustZone}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {1--15}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_1}, doi = {10.1007/978-3-642-32298-3\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/WinterWPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/YueLX11, author = {Qinggang Yue and Feng Liu and Rui Xue}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {84--101}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_6}, doi = {10.1007/978-3-642-32298-3\_6}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/YueLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhangZWLGW11, author = {Zijian Zhang and Liehuang Zhu and Feng Wang and Lejian Liao and Cong Guo and Hongyuan Wang}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Computationally Sound Symbolic Analysis of {EAP-TNC} Protocol}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {113--128}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_8}, doi = {10.1007/978-3-642-32298-3\_8}, timestamp = {Wed, 11 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/ZhangZWLGW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2010, editor = {Liqun Chen and Moti Yung}, title = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25283-9}, doi = {10.1007/978-3-642-25283-9}, isbn = {978-3-642-25282-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/AkdemirKPS10, author = {Kahraman D. Akdemir and Deniz Karakoyunlu and Taskin Padir and Berk Sunar}, editor = {Liqun Chen and Moti Yung}, title = {An Emerging Threat: Eve Meets a Robot - (Work-in-Progress)}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {271--289}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_18}, doi = {10.1007/978-3-642-25283-9\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/AkdemirKPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/AliNZ10, author = {Tamleek Ali and Mohammad Nauman and Xinwen Zhang}, editor = {Liqun Chen and Moti Yung}, title = {On Leveraging Stochastic Models for Remote Attestation}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {290--301}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_19}, doi = {10.1007/978-3-642-25283-9\_19}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/AliNZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/BenteHVHW10, author = {Ingo Bente and Bastian Hellmann and J{\"{o}}rg Vieweg and Josef von Helden and Arne Welzel}, editor = {Liqun Chen and Moti Yung}, title = {Interoperable Remote Attestation for {VPN} Environments - (Work in Progress)}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {302--315}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_20}, doi = {10.1007/978-3-642-25283-9\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/BenteHVHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/BlaskiewiczKK10, author = {Przemyslaw Blaskiewicz and Przemyslaw Kubiak and Miroslaw Kutylowski}, editor = {Liqun Chen and Moti Yung}, title = {Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {173--188}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_12}, doi = {10.1007/978-3-642-25283-9\_12}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/BlaskiewiczKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/BugielDKSW10, author = {Sven Bugiel and Alexandra Dmitrienko and Kari Kostiainen and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Liqun Chen and Moti Yung}, title = {TruWalletM: Secure Web Authentication on Mobile Platforms}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {219--236}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_15}, doi = {10.1007/978-3-642-25283-9\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/BugielDKSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ChenL10, author = {Liqun Chen and Jiangtao Li}, editor = {Liqun Chen and Moti Yung}, title = {Revocation of Direct Anonymous Attestation}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {128--147}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_9}, doi = {10.1007/978-3-642-25283-9\_9}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ChenL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/GallaisGHKMRSTW10, author = {Jean{-}Fran{\c{c}}ois Gallais and Johann Gro{\ss}sch{\"{a}}dl and Neil Hanley and Markus Kasper and Marcel Medwed and Francesco Regazzoni and J{\"{o}}rn{-}Marc Schmidt and Stefan Tillich and Marcin W{\'{o}}jcik}, editor = {Liqun Chen and Moti Yung}, title = {Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {253--270}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_17}, doi = {10.1007/978-3-642-25283-9\_17}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/GallaisGHKMRSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/GuGYBM10, author = {Liang Gu and Yao Guo and Yanjiang Yang and Feng Bao and Hong Mei}, editor = {Liqun Chen and Moti Yung}, title = {Modeling TCG-Based Secure Systems with Colored Petri Nets}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {67--86}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_5}, doi = {10.1007/978-3-642-25283-9\_5}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/GuGYBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/HaoRS10, author = {Dong Hao and Yizhi Ren and Kouichi Sakurai}, editor = {Liqun Chen and Moti Yung}, title = {A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress)}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {237--252}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_16}, doi = {10.1007/978-3-642-25283-9\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/HaoRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/HuangL10, author = {Jialin Huang and Xuejia Lai}, editor = {Liqun Chen and Moti Yung}, title = {Measuring Random Tests by Conditional Entropy and Optimal Execution Order}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {148--159}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_10}, doi = {10.1007/978-3-642-25283-9\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/HuangL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/LiH10, author = {Shangjie Li and Yeping He}, editor = {Liqun Chen and Moti Yung}, title = {Trusted Subjects Configuration Based on {TE} Model in {MLS} Systems}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {98--107}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_7}, doi = {10.1007/978-3-642-25283-9\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/LiH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/MaoYZS10, author = {Liangjian Mao and Shuzhen Yao and Kai Zhang and Kouichi Sakurai}, editor = {Liqun Chen and Moti Yung}, title = {Design and Implementation of Document Access Control Model Based on Role and Security Policy}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {26--36}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_2}, doi = {10.1007/978-3-642-25283-9\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/MaoYZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/MengCCLMR10, author = {Jinli Meng and Xinming Chen and Zhen Chen and Chuang Lin and Beipeng Mu and Lingyun Ruan}, editor = {Liqun Chen and Moti Yung}, title = {Towards High-Performance IPsec on Cavium {OCTEON} Platform}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {37--46}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_3}, doi = {10.1007/978-3-642-25283-9\_3}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/MengCCLMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/NamilukoM10, author = {Cornelius Namiluko and Andrew P. Martin}, editor = {Liqun Chen and Moti Yung}, title = {An Abstract Model of a Trusted Platform}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {47--66}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_4}, doi = {10.1007/978-3-642-25283-9\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/NamilukoM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/PhongMY10, author = {Le Trieu Phong and Shin'ichiro Matsuo and Moti Yung}, editor = {Liqun Chen and Moti Yung}, title = {Leakage Resilient Strong Key-Insulated Signatures in Public Channel}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {160--172}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_11}, doi = {10.1007/978-3-642-25283-9\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/PhongMY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ReiterNKWD10, author = {Andreas Reiter and Georg Neubauer and Michael Kapfenberger and Johannes Winter and Kurt Dietrich}, editor = {Liqun Chen and Moti Yung}, title = {Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {1--25}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_1}, doi = {10.1007/978-3-642-25283-9\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ReiterNKWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/SongJWZ10, author = {Xiangmei Song and Shiguang Ju and Changda Wang and Conghua Zhou}, editor = {Liqun Chen and Moti Yung}, title = {Information Flow Graph: An Approach to Identifying Covert Storage Channels}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {87--97}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_6}, doi = {10.1007/978-3-642-25283-9\_6}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/SongJWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/TamrakarELAA10, author = {Sandeep Tamrakar and Jan{-}Erik Ekberg and Pekka Laitinen and N. Asokan and Tuomas Aura}, editor = {Liqun Chen and Moti Yung}, title = {Can Hand-Held Computers Still Be Better Smart Cards?}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {200--218}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_14}, doi = {10.1007/978-3-642-25283-9\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/TamrakarELAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ToeglPG10, author = {Ronald Toegl and Martin Pirker and Michael Gissing}, editor = {Liqun Chen and Moti Yung}, title = {acTvSM: {A} Dynamic Virtualization Platform for Enforcement of Application Integrity}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {326--345}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_22}, doi = {10.1007/978-3-642-25283-9\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ToeglPG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WalkerL10, author = {Jesse Walker and Jiangtao Li}, editor = {Liqun Chen and Moti Yung}, title = {Key Exchange with Anonymous Authentication Using {DAA-SIGMA} Protocol}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {108--127}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_8}, doi = {10.1007/978-3-642-25283-9\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/WalkerL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Wright10, author = {Craig S. Wright}, editor = {Liqun Chen and Moti Yung}, title = {Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure Software}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {346--360}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_23}, doi = {10.1007/978-3-642-25283-9\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Wright10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/YangGB10, author = {Yanjiang Yang and Liang Gu and Feng Bao}, editor = {Liqun Chen and Moti Yung}, title = {Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {189--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_13}, doi = {10.1007/978-3-642-25283-9\_13}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/YangGB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhangLL10, author = {Yongzhong Zhang and Qi Li and Zhangxi Lin}, editor = {Liqun Chen and Moti Yung}, title = {A Novel Reputation Computing Model - (Work-in-Progress)}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {316--325}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_21}, doi = {10.1007/978-3-642-25283-9\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ZhangLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2009, editor = {Liqun Chen and Moti Yung}, title = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14597-1}, doi = {10.1007/978-3-642-14597-1}, isbn = {978-3-642-14596-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/BenteVH09, author = {Ingo Bente and J{\"{o}}rg Vieweg and Josef von Helden}, editor = {Liqun Chen and Moti Yung}, title = {Privacy Enhanced Trusted Network Connect}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {129--145}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_8}, doi = {10.1007/978-3-642-14597-1\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/BenteVH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/CabukCPR09, author = {Serdar Cabuk and Liqun Chen and David Plaquin and Mark Ryan}, editor = {Liqun Chen and Moti Yung}, title = {Trusted Integrity Measurement and Reporting for Virtualized Platforms}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {180--196}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_11}, doi = {10.1007/978-3-642-14597-1\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/CabukCPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/CatuognoDEKRSSSWZ09, author = {Luigi Catuogno and Alexandra Dmitrienko and Konrad Eriksson and Dirk Kuhlmann and Gianluca Ramunno and Ahmad{-}Reza Sadeghi and Steffen Schulz and Matthias Schunter and Marcel Winandy and Jing Zhan}, editor = {Liqun Chen and Moti Yung}, title = {Trusted Virtual Domains - Design, Implementation and Lessons Learned}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {156--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_10}, doi = {10.1007/978-3-642-14597-1\_10}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/CatuognoDEKRSSSWZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Dietrich09, author = {Kurt Dietrich}, editor = {Liqun Chen and Moti Yung}, title = {Anonymous Credentials for Java Enabled Platforms: {A} Performance Evaluation}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {88--103}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_6}, doi = {10.1007/978-3-642-14597-1\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Dietrich09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/DuLS09, author = {Zhen{-}Long Du and Xiaoli Li and Kangkang Shen}, editor = {Liqun Chen and Moti Yung}, title = {Trusted Firmware Services Based on {TPM}}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {227--235}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_14}, doi = {10.1007/978-3-642-14597-1\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/DuLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/EkbergA09, author = {Jan{-}Erik Ekberg and N. Asokan}, editor = {Liqun Chen and Moti Yung}, title = {External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {16--38}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_2}, doi = {10.1007/978-3-642-14597-1\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/EkbergA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/GuCDDGS09, author = {Liang Gu and Yueqiang Cheng and Xuhua Ding and Robert H. Deng and Yao Guo and Weizhong Shao}, editor = {Liqun Chen and Moti Yung}, title = {Remote Attestation on Function Execution (Work-in-Progress)}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {60--72}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_4}, doi = {10.1007/978-3-642-14597-1\_4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/GuCDDGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/LiZ09, author = {Mengmeng Li and Yong Zhao}, editor = {Liqun Chen and Moti Yung}, title = {Research on Multistage Interconnection Architecture and Collision Detection Model}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {146--155}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_9}, doi = {10.1007/978-3-642-14597-1\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/LiZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/LiaoZS09, author = {Jianhua Liao and Yong Zhao and Changxiang Shen}, editor = {Liqun Chen and Moti Yung}, title = {A Feather-Weight Application Isolation Model}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {197--211}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_12}, doi = {10.1007/978-3-642-14597-1\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/LiaoZS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ParkerX09, author = {T. Paul Parker and Shouhuai Xu}, editor = {Liqun Chen and Moti Yung}, title = {A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {39--59}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_3}, doi = {10.1007/978-3-642-14597-1\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ParkerX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Shi09, author = {Wenchang Shi}, editor = {Liqun Chen and Moti Yung}, title = {On Design of a Trusted Software Base with Support of {TPCM}}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {1--15}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_1}, doi = {10.1007/978-3-642-14597-1\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Shi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/TanveerAN09, author = {Tamleek Ali Tanveer and Masoom Alam and Mohammad Nauman}, editor = {Liqun Chen and Moti Yung}, title = {Scalable Remote Attestation with Privacy Protection}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {73--87}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_5}, doi = {10.1007/978-3-642-14597-1\_5}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/TanveerAN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WuLLZ09, author = {Zhongming Wu and Yiyuan Luo and Xuejia Lai and Bo Zhu}, editor = {Liqun Chen and Moti Yung}, title = {Improved Cryptanalysis of the {FOX} Block Cipher}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {236--249}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_15}, doi = {10.1007/978-3-642-14597-1\_15}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/WuLLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/XuY09, author = {Shouhuai Xu and Moti Yung}, editor = {Liqun Chen and Moti Yung}, title = {SocialClouds: Concept, Security Architecture and Some Mechanisms}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {104--128}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_7}, doi = {10.1007/978-3-642-14597-1\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/XuY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/YanDNY09, author = {Zheng Yan and Yan Dong and Valtteri Niemi and Guoliang Yu}, editor = {Liqun Chen and Moti Yung}, title = {Exploring Trust of Mobile Applications Based on User Behaviors}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {212--226}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_13}, doi = {10.1007/978-3-642-14597-1\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/YanDNY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhuCL09, author = {Bo Zhu and Kefei Chen and Xuejia Lai}, editor = {Liqun Chen and Moti Yung}, title = {Bitwise Higher Order Differential Cryptanalysis}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {250--262}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_16}, doi = {10.1007/978-3-642-14597-1\_16}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ZhuCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.