Search dblp for Publications

export results for "stream:streams/conf/intrust:"

 download as .bib file

@proceedings{DBLP:conf/intrust/2015,
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31550-8},
  doi          = {10.1007/978-3-319-31550-8},
  isbn         = {978-3-319-31549-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BianZSWXZ15,
  author       = {Huishan Bian and
                  Liehuang Zhu and
                  Meng Shen and
                  Mingzhong Wang and
                  Chang Xu and
                  Qiongyu Zhang},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Privacy-Preserving Anomaly Detection Across Multi-domain for Software
                  Defined Networks},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_1},
  doi          = {10.1007/978-3-319-31550-8\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BianZSWXZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KuchtaM15,
  author       = {Veronika Kuchta and
                  Mark Manulis},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Public Key Encryption with Distributed Keyword Search},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {62--83},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_5},
  doi          = {10.1007/978-3-319-31550-8\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/KuchtaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/LinNHZ15,
  author       = {Li Lin and
                  Jian Ni and
                  Jian Hu and
                  Jian{-}biao Zhang},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {RbacIP: {A} RBAC-Based Method for Intercepting and Processing Malicious
                  Applications in Android Platform},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {214--225},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_14},
  doi          = {10.1007/978-3-319-31550-8\_14},
  timestamp    = {Thu, 20 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/LinNHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Piedra15,
  author       = {Antonio de la Piedra},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Efficient Implementation of AND, {OR} and {NOT} Operators for ABCs},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {183--199},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_12},
  doi          = {10.1007/978-3-319-31550-8\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Piedra15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/TaoHZLC15,
  author       = {Zheng Tao and
                  Jun Hu and
                  Jing Zhan and
                  Mo Li and
                  Chunzi Chen},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {An Application-Oriented Efficient Encapsulation System for Trusted
                  Software Development},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_10},
  doi          = {10.1007/978-3-319-31550-8\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/TaoHZLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/UrquidiKLC15,
  author       = {Miguel Urquidi and
                  Dalia Khader and
                  Jean Lancrenon and
                  Liqun Chen},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Attribute-Based Signatures with Controllable Linkability},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {114--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_8},
  doi          = {10.1007/978-3-319-31550-8\_8},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/UrquidiKLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WangH15,
  author       = {Jie Wang and
                  Xiaoxian He},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {A Signature Generation Approach Based on Clustering for Polymorphic
                  Worm},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_6},
  doi          = {10.1007/978-3-319-31550-8\_6},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/WangH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WangWSZ15,
  author       = {Guan Wang and
                  Ziyi Wang and
                  Jian Sun and
                  Jun Zhou},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {An Audit Log Protection Mechanism Based on Security Chip},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {226--233},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_15},
  doi          = {10.1007/978-3-319-31550-8\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/WangWSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YanZ15,
  author       = {Lin Yan and
                  Jian{-}biao Zhang},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Research on Trusted Bootstrap Based on the Universal Smart Card},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {169--182},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_11},
  doi          = {10.1007/978-3-319-31550-8\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/YanZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YanaiMTNO15,
  author       = {Naoto Yanai and
                  Masahiro Mambo and
                  Kazuma Tanaka and
                  Takashi Nishide and
                  Eiji Okamoto},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Another Look at Aggregate Signatures: Their Capability and Security
                  on Network Graphs},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {32--48},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_3},
  doi          = {10.1007/978-3-319-31550-8\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/YanaiMTNO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YapT15,
  author       = {Jiun Yi Yap and
                  Allan Tomlinson},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {A Causality-Based Model for Describing the Trustworthiness of a Computing
                  Device},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_9},
  doi          = {10.1007/978-3-319-31550-8\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/YapT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YasudaAS15,
  author       = {Takanori Yasuda and
                  Hiroaki Anada and
                  Kouichi Sakurai},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Application of {NTRU} Using Group Rings to Partial Decryption Technique},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {203--213},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_13},
  doi          = {10.1007/978-3-319-31550-8\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/YasudaAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhaoS15,
  author       = {Hui Zhao and
                  Kouichi Sakurai},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Computational Soundness of Uniformity Properties for Multi-party Computation
                  Based on {LSSS}},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {99--113},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_7},
  doi          = {10.1007/978-3-319-31550-8\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhaoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Zhu15,
  author       = {Huafei Zhu},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Distributed Multi-user, Multi-key Searchable Encryptions Resilient
                  Fault Tolerance},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_2},
  doi          = {10.1007/978-3-319-31550-8\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Zhu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Zhu15a,
  author       = {Huafei Zhu},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Universally Composable Oblivious Database in the Presence of Malicious
                  Adversaries},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {49--61},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_4},
  doi          = {10.1007/978-3-319-31550-8\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Zhu15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2014,
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27998-5},
  doi          = {10.1007/978-3-319-27998-5},
  isbn         = {978-3-319-27997-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/AnadaKWS14,
  author       = {Hiroaki Anada and
                  Junpei Kawamoto and
                  Jian Weng and
                  Kouichi Sakurai},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Identity-Embedding Method for Decentralized Public-Key Infrastructure},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_1},
  doi          = {10.1007/978-3-319-27998-5\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/AnadaKWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BlaskiewiczKKS14,
  author       = {Przemyslaw Blaskiewicz and
                  Marek Klonowski and
                  Miroslaw Kutylowski and
                  Piotr Syga},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Lightweight Protocol for Trusted Spontaneous Communication},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {228--242},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_15},
  doi          = {10.1007/978-3-319-27998-5\_15},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BlaskiewiczKKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/DingZ14,
  author       = {Dan Ding and
                  Guizhen Zhu},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {A Simulated Annealing Algorithm for {SVP} Challenge Through y-Sparse
                  Representations of Short Lattice Vectors},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {51--69},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_4},
  doi          = {10.1007/978-3-319-27998-5\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/DingZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/FanZZF14,
  author       = {Guangjun Fan and
                  Yongbin Zhou and
                  Hailong Zhang and
                  Dengguo Feng},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {How to Choose Interesting Points for Template Attacks More Effectively?},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_11},
  doi          = {10.1007/978-3-319-27998-5\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/FanZZF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/FanZZF14a,
  author       = {Guangjun Fan and
                  Yongbin Zhou and
                  Hailong Zhang and
                  Dengguo Feng},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Template Attacks Based on Priori Knowledge},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {346--363},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_22},
  doi          = {10.1007/978-3-319-27998-5\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/FanZZF14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/GuoMLX14,
  author       = {Hua Guo and
                  Fangchao Ma and
                  Zhoujun Li and
                  Chunhe Xia},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Key-Exposure Protection in Public Auditing with User Revocation in
                  Cloud Storage},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {127--136},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_8},
  doi          = {10.1007/978-3-319-27998-5\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/GuoMLX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/HanWZPF14,
  author       = {Weili Han and
                  Wei Wang and
                  Xinyi Zhang and
                  Weiwei Peng and
                  Zheran Fang},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {{APP} Vetting Based on the Consistency of Description and {APK}},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {259--277},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_17},
  doi          = {10.1007/978-3-319-27998-5\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/HanWZPF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/HellKSM14,
  author       = {Martin Hell and
                  Linus Karlsson and
                  Ben J. M. Smeets and
                  Jelena Mirosavljevic},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Using {TPM} Secure Storage in Trusted High Availability Systems},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {243--258},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_16},
  doi          = {10.1007/978-3-319-27998-5\_16},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/HellKSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/HongXL14,
  author       = {Jiaqi Hong and
                  Haixia Xu and
                  Peili Li},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Verifiable Computation of Large Polynomials},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {90--104},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_6},
  doi          = {10.1007/978-3-319-27998-5\_6},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/HongXL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/HuangHCCY14,
  author       = {Yun{-}Ju Huang and
                  Wei{-}Chih Hong and
                  Chen{-}Mou Cheng and
                  Jiun{-}Ming Chen and
                  Bo{-}Yin Yang},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {A Memory Efficient Variant of an Implementation of the {F} {\_}4 Algorithm
                  for Computing Gr{\"{o}}bner Bases},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {374--393},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_24},
  doi          = {10.1007/978-3-319-27998-5\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/HuangHCCY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/HuangLH14,
  author       = {Xuezhen Huang and
                  Jiqiang Liu and
                  Zhen Han},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {A Privacy-Aware Access Model on Anonymized Data},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {201--212},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_13},
  doi          = {10.1007/978-3-319-27998-5\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/HuangLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KuchtaM14,
  author       = {Veronika Kuchta and
                  Mark Manulis},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Rerandomizable Threshold Blind Signatures},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {70--89},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_5},
  doi          = {10.1007/978-3-319-27998-5\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/KuchtaM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/LiLW14,
  author       = {Chao Li and
                  Bo Lang and
                  Jinmiao Wang},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Outsourced {KP-ABE} with Enhanced Security},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_3},
  doi          = {10.1007/978-3-319-27998-5\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/LiLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/NishideIIO14,
  author       = {Takashi Nishide and
                  Mitsugu Iwamoto and
                  Atsushi Iwasaki and
                  Kazuo Ohta},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Secure {(M+1)} st-Price Auction with Automatic Tie-Break},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {422--437},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_27},
  doi          = {10.1007/978-3-319-27998-5\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/NishideIIO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/RautiLHMHL14,
  author       = {Sampsa Rauti and
                  Samuel Laur{\'{e}}n and
                  Shohreh Hosseinzadeh and
                  Jari{-}Matti M{\"{a}}kel{\"{a}} and
                  Sami Hyrynsalmi and
                  Ville Lepp{\"{a}}nen},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Diversification of System Calls in Linux Binaries},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {15--35},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_2},
  doi          = {10.1007/978-3-319-27998-5\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/RautiLHMHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/RuanM14,
  author       = {Anbang Ruan and
                  Andrew P. Martin},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {184--200},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_12},
  doi          = {10.1007/978-3-319-27998-5\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/RuanM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/SongLY14,
  author       = {Chenggen Song and
                  Xin Liu and
                  Yalong Yan},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Efficient Public Key Encryption with Field-Free Conjunctive Keywords
                  Search},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {394--406},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_25},
  doi          = {10.1007/978-3-319-27998-5\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/SongLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/TianWM14,
  author       = {Baoping Tian and
                  Fushan Wei and
                  Chuangui Ma},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol
                  over {RSA} Group},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {407--421},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_26},
  doi          = {10.1007/978-3-319-27998-5\_26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/TianWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WangLT14,
  author       = {Li Wang and
                  Hongda Li and
                  Fei Tang},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Functional Signatures from Indistinguishability Obfuscation},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {213--227},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_14},
  doi          = {10.1007/978-3-319-27998-5\_14},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/WangLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WeissWAS14,
  author       = {Michael Wei{\ss} and
                  Benjamin Weggenmann and
                  Moritz August and
                  Georg Sigl},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {On Cache Timing Attacks Considering Multi-core Aspects in Virtualized
                  Embedded Systems},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {151--167},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_10},
  doi          = {10.1007/978-3-319-27998-5\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/WeissWAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/XueZHRL14,
  author       = {Jingfeng Xue and
                  Yan Zhang and
                  Changzhen Hu and
                  Hongyu Ren and
                  Zhiqiang Li},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Software Behavior Model Measuring Approach of Combining Structural
                  Analysis and Language Set},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {137--150},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_9},
  doi          = {10.1007/978-3-319-27998-5\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/XueZHRL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhaiGH14,
  author       = {Gaoshou Zhai and
                  Tao Guo and
                  Jie Huang},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {SCIATool: {A} Tool for Analyzing SELinux Policies Based on Access
                  Control Spaces, Information Flows and CPNs},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {294--309},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_19},
  doi          = {10.1007/978-3-319-27998-5\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhaiGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhanXX14,
  author       = {Zhenxin Zhan and
                  Maochao Xu and
                  Shouhuai Xu},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {A Characterization of Cybersecurity Posture from Network Telescope
                  Data},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {105--126},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_7},
  doi          = {10.1007/978-3-319-27998-5\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhanXX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhangLW14,
  author       = {Fan Zhang and
                  Liangze Li and
                  Hongfeng Wu},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Faster Pairing Computation on Jacobi Quartic Curves with High-Degree
                  Twists},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {310--327},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_20},
  doi          = {10.1007/978-3-319-27998-5\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhangLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhangZZ14,
  author       = {Wenying Zhang and
                  Jiaqi Zhang and
                  Xiangqian Zheng},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Some Observations on the Lightweight Block Cipher Piccolo-80},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {364--373},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_23},
  doi          = {10.1007/978-3-319-27998-5\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhangZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhuLY14,
  author       = {Yan Zhu and
                  Dandan Li and
                  Liguang Yang},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Traitor Tracing Based on Partially-Ordered Hierarchical Encryption},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {278--293},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_18},
  doi          = {10.1007/978-3-319-27998-5\_18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhuLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhuTYLM14,
  author       = {Min Zhu and
                  Bibo Tu and
                  Ruibang You and
                  Yanzhao Li and
                  Dan Meng},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple
                  Memory Copies and Data Lifetimes},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {328--345},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_21},
  doi          = {10.1007/978-3-319-27998-5\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhuTYLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BenderFK13,
  author       = {Jens Bender and
                  Marc Fischlin and
                  Dennis K{\"{u}}gler},
  editor       = {Roderick Bloem and
                  Peter Lipp},
  title        = {The PACE{\(\vert\)}CA Protocol for Machine Readable Travel Documents},
  booktitle    = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz,
                  Austria, December 4-5, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8292},
  pages        = {17--35},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03491-1\_2},
  doi          = {10.1007/978-3-319-03491-1\_2},
  timestamp    = {Mon, 03 Jan 2022 22:38:23 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/BenderFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Koeberl0W13,
  author       = {Patrick Koeberl and
                  Jiangtao Li and
                  Wei Wu},
  editor       = {Roderick Bloem and
                  Peter Lipp},
  title        = {A Spatial Majority Voting Technique to Reduce Error Rate of Physically
                  Unclonable Functions},
  booktitle    = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz,
                  Austria, December 4-5, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8292},
  pages        = {36--52},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03491-1\_3},
  doi          = {10.1007/978-3-319-03491-1\_3},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/Koeberl0W13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KrautsevichLMY13,
  author       = {Leanid Krautsevich and
                  Aliaksandr Lazouski and
                  Fabio Martinelli and
                  Artsiom Yautsiukhin},
  editor       = {Roderick Bloem and
                  Peter Lipp},
  title        = {Towards Policy Engineering for Attribute-Based Access Control},
  booktitle    = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz,
                  Austria, December 4-5, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8292},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03491-1\_6},
  doi          = {10.1007/978-3-319-03491-1\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/KrautsevichLMY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/MartinelliMSS13,
  author       = {Fabio Martinelli and
                  Ilaria Matteucci and
                  Andrea Saracino and
                  Daniele Sgandurra},
  editor       = {Roderick Bloem and
                  Peter Lipp},
  title        = {Remote Policy Enforcement for Trusted Application Execution in Mobile
                  Environments},
  booktitle    = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz,
                  Austria, December 4-5, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8292},
  pages        = {70--84},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03491-1\_5},
  doi          = {10.1007/978-3-319-03491-1\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/MartinelliMSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/VeltenWSE13,
  author       = {Michael Velten and
                  Sascha Wessel and
                  Frederic Stumpf and
                  Claudia Eckert},
  editor       = {Roderick Bloem and
                  Peter Lipp},
  title        = {Active File Integrity Monitoring Using Paravirtualized Filesystems},
  booktitle    = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz,
                  Austria, December 4-5, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8292},
  pages        = {53--69},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03491-1\_4},
  doi          = {10.1007/978-3-319-03491-1\_4},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/VeltenWSE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YapT13,
  author       = {Jiun Yi Yap and
                  Allan Tomlinson},
  editor       = {Roderick Bloem and
                  Peter Lipp},
  title        = {Para-Virtualizing the Trusted Platform Module: An Enterprise Framework
                  Based on Version 2.0 Specification},
  booktitle    = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz,
                  Austria, December 4-5, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8292},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03491-1\_1},
  doi          = {10.1007/978-3-319-03491-1\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/YapT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2013,
  editor       = {Roderick Bloem and
                  Peter Lipp},
  title        = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz,
                  Austria, December 4-5, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8292},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03491-1},
  doi          = {10.1007/978-3-319-03491-1},
  isbn         = {978-3-319-03490-4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BrickellCL12,
  author       = {Ernie Brickell and
                  Liqun Chen and
                  Jiangtao Li},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation
                  Schemes},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {95--111},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_9},
  doi          = {10.1007/978-3-642-35371-0\_9},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BrickellCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/DiniMMPSS12,
  author       = {Gianluca Dini and
                  Fabio Martinelli and
                  Ilaria Matteucci and
                  Marinella Petrocchi and
                  Andrea Saracino and
                  Daniele Sgandurra},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {A Multi-criteria-Based Evaluation of Android Applications},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {67--82},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_7},
  doi          = {10.1007/978-3-642-35371-0\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/DiniMMPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KrzywieckiKK12,
  author       = {Lukasz Krzywiecki and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy
                  Trees},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {5--24},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_2},
  doi          = {10.1007/978-3-642-35371-0\_2},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/KrzywieckiKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KuntzeRP12,
  author       = {Nicolai Kuntze and
                  Carsten Rudolph and
                  Janne Paatero},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {Establishing Trust between Nodes in Mobile Ad-Hoc Networks},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {48--62},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_4},
  doi          = {10.1007/978-3-642-35371-0\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/KuntzeRP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Laud12,
  author       = {Peeter Laud},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {Secure Implementation of Asynchronous Method Calls and Futures},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {25--47},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_3},
  doi          = {10.1007/978-3-642-35371-0\_3},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Laud12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Matsuo12,
  author       = {Shin'ichiro Matsuo},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {Panel Discussion: Mobile Device Trust - How Do We Link Social Needs,
                  Technical Requirements, Techniques and Standards?},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {63--64},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_5},
  doi          = {10.1007/978-3-642-35371-0\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Matsuo12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Paar12,
  author       = {Christof Paar},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {The Yin and Yang Sides of Embedded Security},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {112--115},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_10},
  doi          = {10.1007/978-3-642-35371-0\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Paar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/RomanL12,
  author       = {Rodrigo Roman and
                  Javier L{\'{o}}pez},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {Security in the Distributed Internet of Things},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {65--66},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_6},
  doi          = {10.1007/978-3-642-35371-0\_6},
  timestamp    = {Thu, 04 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/RomanL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Ryan12,
  author       = {Mark Dermot Ryan},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {Automatic Analysis of Security Properties of the {TPM}},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_1},
  doi          = {10.1007/978-3-642-35371-0\_1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/Ryan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/TillichW12,
  author       = {Stefan Tillich and
                  Marcin W{\'{o}}jcik},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {Security Analysis of an Open Car Immobilizer Protocol Stack},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {83--94},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_8},
  doi          = {10.1007/978-3-642-35371-0\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/TillichW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2011,
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32298-3},
  doi          = {10.1007/978-3-642-32298-3},
  isbn         = {978-3-642-32297-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2012,
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0},
  doi          = {10.1007/978-3-642-35371-0},
  isbn         = {978-3-642-35370-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Bouabana-Tebibel11,
  author       = {Thouraya Bouabana{-}Tebibel},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Hash Chains at the Basis of a Secure Reactive Routing Protocol},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {258--270},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_17},
  doi          = {10.1007/978-3-642-32298-3\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Bouabana-Tebibel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BrickellCL11,
  author       = {Ernie Brickell and
                  Liqun Chen and
                  Jiangtao Li},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {A (Corrected) {DAA} Scheme Using Batch Proof and Verification},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {304--337},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_20},
  doi          = {10.1007/978-3-642-32298-3\_20},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BrickellCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ChenMT11,
  author       = {Chunhua Chen and
                  Chris J. Mitchell and
                  Shaohua Tang},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Building General Purpose Security Services on Trusted Computing},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {16--31},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_2},
  doi          = {10.1007/978-3-642-32298-3\_2},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ChenMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ChengGLWZCH11,
  author       = {Pengqi Cheng and
                  Yan Gu and
                  Zihong Lv and
                  Jianfei Wang and
                  Wenlei Zhu and
                  Zhen Chen and
                  Jiwei Huang},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {A Performance Analysis of Identity-Based Encryption Schemes},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {289--303},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_19},
  doi          = {10.1007/978-3-642-32298-3\_19},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/ChengGLWZCH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/DerlerPWD11,
  author       = {David Derler and
                  Klaus Potzmader and
                  Johannes Winter and
                  Kurt Dietrich},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Anonymous Ticketing for NFC-Enabled Mobile Phones},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {66--83},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_5},
  doi          = {10.1007/978-3-642-32298-3\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/DerlerPWD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/EkbergT11,
  author       = {Jan{-}Erik Ekberg and
                  Sandeep Tamrakar},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Mass Transit Ticketing with {NFC} Mobile Phones},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {48--65},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_4},
  doi          = {10.1007/978-3-642-32298-3\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/EkbergT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/GligoroskiOJPFKM11,
  author       = {Danilo Gligoroski and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Rune Erlend Jensen and
                  Ludovic Perret and
                  Jean{-}Charles Faug{\`{e}}re and
                  Svein Johan Knapskog and
                  Smile Markovski},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {{MQQ-SIG} - An Ultra-Fast and Provably {CMA} Resistant Digital Signature
                  Scheme},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {184--203},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_13},
  doi          = {10.1007/978-3-642-32298-3\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/GligoroskiOJPFKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Halunen11,
  author       = {Kimmo Halunen},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Multicollisions and Graph-Based Hash Functions},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {156--167},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_11},
  doi          = {10.1007/978-3-642-32298-3\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Halunen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/HaoAS11,
  author       = {Dong Hao and
                  Avishek Adhikari and
                  Kouichi Sakurai},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Mixed-Strategy Game Based Trust Management for Clustered Wireless
                  Sensor Networks},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {239--257},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_16},
  doi          = {10.1007/978-3-642-32298-3\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/HaoAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/JamthagenHS11,
  author       = {Christopher J{\"{a}}mthagen and
                  Martin Hell and
                  Ben J. M. Smeets},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {A Technique for Remote Detection of Certain Virtual Machine Monitors},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {129--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_9},
  doi          = {10.1007/978-3-642-32298-3\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/JamthagenHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KoeberlLMRVW11,
  author       = {Patrick Koeberl and
                  Jiangtao Li and
                  Roel Maes and
                  Anand Rajan and
                  Claire Vishik and
                  Marcin W{\'{o}}jcik},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Evaluation of a {PUF} Device Authentication Scheme on a Discrete 0.13um
                  {SRAM}},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {271--288},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_18},
  doi          = {10.1007/978-3-642-32298-3\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/KoeberlLMRVW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KoungaC11,
  author       = {Gina Kounga and
                  Liqun Chen},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Enforcing Sticky Policies with {TPM} and Virtualization},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {32--47},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_3},
  doi          = {10.1007/978-3-642-32298-3\_3},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/KoungaC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KutylowskiKKK11,
  author       = {Miroslaw Kutylowski and
                  Lukasz Krzywiecki and
                  Przemyslaw Kubiak and
                  Michal Koza},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Restricted Identification Scheme and Diffie-Hellman Linking Problem},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {221--238},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_15},
  doi          = {10.1007/978-3-642-32298-3\_15},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/KutylowskiKKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/LiGLLH11,
  author       = {Wei Li and
                  Dawu Gu and
                  Zhiqiang Liu and
                  Ya Liu and
                  Xiaohu Huang},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Fault Detection of the MacGuffin Cipher against Differential Fault
                  Attack},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {102--112},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_7},
  doi          = {10.1007/978-3-642-32298-3\_7},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/LiGLLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/LuoLG11,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Zheng Gong},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Indifferentiability of Domain Extension Modes for Hash Functions},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {138--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_10},
  doi          = {10.1007/978-3-642-32298-3\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/LuoLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/MatsuoMY11,
  author       = {Shin'ichiro Matsuo and
                  Daisuke Moriyama and
                  Moti Yung},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Multifactor Authenticated Key Renewal},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {204--220},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_14},
  doi          = {10.1007/978-3-642-32298-3\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/MatsuoMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Peng11,
  author       = {Kun Peng},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {A General, Flexible and Efficient Proof of Inclusion and Exclusion},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_12},
  doi          = {10.1007/978-3-642-32298-3\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/QinCFF11,
  author       = {Yu Qin and
                  XiaoBo Chu and
                  Dengguo Feng and
                  Wei Feng},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {{DAA} Protocol Analysis and Verification},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {338--350},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_21},
  doi          = {10.1007/978-3-642-32298-3\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/QinCFF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WinterWPT11,
  author       = {Johannes Winter and
                  Paul Wiegele and
                  Martin Pirker and
                  Ronald T{\"{o}}gl},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {A Flexible Software Development and Emulation Framework for {ARM}
                  TrustZone},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_1},
  doi          = {10.1007/978-3-642-32298-3\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/WinterWPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YueLX11,
  author       = {Qinggang Yue and
                  Feng Liu and
                  Rui Xue},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Some Improvements to the Cost-Based Framework for Analyzing Denial
                  of Service Attacks},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {84--101},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_6},
  doi          = {10.1007/978-3-642-32298-3\_6},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/YueLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhangZWLGW11,
  author       = {Zijian Zhang and
                  Liehuang Zhu and
                  Feng Wang and
                  Lejian Liao and
                  Cong Guo and
                  Hongyuan Wang},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Computationally Sound Symbolic Analysis of {EAP-TNC} Protocol},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {113--128},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_8},
  doi          = {10.1007/978-3-642-32298-3\_8},
  timestamp    = {Wed, 11 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhangZWLGW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2010,
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25283-9},
  doi          = {10.1007/978-3-642-25283-9},
  isbn         = {978-3-642-25282-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/AkdemirKPS10,
  author       = {Kahraman D. Akdemir and
                  Deniz Karakoyunlu and
                  Taskin Padir and
                  Berk Sunar},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {An Emerging Threat: Eve Meets a Robot - (Work-in-Progress)},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {271--289},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_18},
  doi          = {10.1007/978-3-642-25283-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/AkdemirKPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/AliNZ10,
  author       = {Tamleek Ali and
                  Mohammad Nauman and
                  Xinwen Zhang},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {On Leveraging Stochastic Models for Remote Attestation},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {290--301},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_19},
  doi          = {10.1007/978-3-642-25283-9\_19},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/AliNZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BenteHVHW10,
  author       = {Ingo Bente and
                  Bastian Hellmann and
                  J{\"{o}}rg Vieweg and
                  Josef von Helden and
                  Arne Welzel},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Interoperable Remote Attestation for {VPN} Environments - (Work in
                  Progress)},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {302--315},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_20},
  doi          = {10.1007/978-3-642-25283-9\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BenteHVHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BlaskiewiczKK10,
  author       = {Przemyslaw Blaskiewicz and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work
                  in Progress},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {173--188},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_12},
  doi          = {10.1007/978-3-642-25283-9\_12},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BlaskiewiczKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BugielDKSW10,
  author       = {Sven Bugiel and
                  Alexandra Dmitrienko and
                  Kari Kostiainen and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {TruWalletM: Secure Web Authentication on Mobile Platforms},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {219--236},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_15},
  doi          = {10.1007/978-3-642-25283-9\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BugielDKSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ChenL10,
  author       = {Liqun Chen and
                  Jiangtao Li},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Revocation of Direct Anonymous Attestation},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {128--147},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_9},
  doi          = {10.1007/978-3-642-25283-9\_9},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ChenL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/GallaisGHKMRSTW10,
  author       = {Jean{-}Fran{\c{c}}ois Gallais and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Neil Hanley and
                  Markus Kasper and
                  Marcel Medwed and
                  Francesco Regazzoni and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Stefan Tillich and
                  Marcin W{\'{o}}jcik},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of
                  Cryptographic Software},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {253--270},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_17},
  doi          = {10.1007/978-3-642-25283-9\_17},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/GallaisGHKMRSTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/GuGYBM10,
  author       = {Liang Gu and
                  Yao Guo and
                  Yanjiang Yang and
                  Feng Bao and
                  Hong Mei},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Modeling TCG-Based Secure Systems with Colored Petri Nets},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {67--86},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_5},
  doi          = {10.1007/978-3-642-25283-9\_5},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/GuGYBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/HaoRS10,
  author       = {Dong Hao and
                  Yizhi Ren and
                  Kouichi Sakurai},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {A Game Theory-Based Surveillance Mechanism against Suspicious Insiders
                  in MANETs - (Work-in-Progress)},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {237--252},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_16},
  doi          = {10.1007/978-3-642-25283-9\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/HaoRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/HuangL10,
  author       = {Jialin Huang and
                  Xuejia Lai},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Measuring Random Tests by Conditional Entropy and Optimal Execution
                  Order},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {148--159},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_10},
  doi          = {10.1007/978-3-642-25283-9\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/HuangL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/LiH10,
  author       = {Shangjie Li and
                  Yeping He},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Trusted Subjects Configuration Based on {TE} Model in {MLS} Systems},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {98--107},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_7},
  doi          = {10.1007/978-3-642-25283-9\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/LiH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/MaoYZS10,
  author       = {Liangjian Mao and
                  Shuzhen Yao and
                  Kai Zhang and
                  Kouichi Sakurai},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Design and Implementation of Document Access Control Model Based on
                  Role and Security Policy},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {26--36},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_2},
  doi          = {10.1007/978-3-642-25283-9\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/MaoYZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/MengCCLMR10,
  author       = {Jinli Meng and
                  Xinming Chen and
                  Zhen Chen and
                  Chuang Lin and
                  Beipeng Mu and
                  Lingyun Ruan},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Towards High-Performance IPsec on Cavium {OCTEON} Platform},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {37--46},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_3},
  doi          = {10.1007/978-3-642-25283-9\_3},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/MengCCLMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/NamilukoM10,
  author       = {Cornelius Namiluko and
                  Andrew P. Martin},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {An Abstract Model of a Trusted Platform},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {47--66},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_4},
  doi          = {10.1007/978-3-642-25283-9\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/NamilukoM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/PhongMY10,
  author       = {Le Trieu Phong and
                  Shin'ichiro Matsuo and
                  Moti Yung},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Leakage Resilient Strong Key-Insulated Signatures in Public Channel},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {160--172},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_11},
  doi          = {10.1007/978-3-642-25283-9\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/PhongMY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ReiterNKWD10,
  author       = {Andreas Reiter and
                  Georg Neubauer and
                  Michael Kapfenberger and
                  Johannes Winter and
                  Kurt Dietrich},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Seamless Integration of Trusted Computing into Standard Cryptographic
                  Frameworks},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_1},
  doi          = {10.1007/978-3-642-25283-9\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ReiterNKWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/SongJWZ10,
  author       = {Xiangmei Song and
                  Shiguang Ju and
                  Changda Wang and
                  Conghua Zhou},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Information Flow Graph: An Approach to Identifying Covert Storage
                  Channels},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {87--97},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_6},
  doi          = {10.1007/978-3-642-25283-9\_6},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/SongJWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/TamrakarELAA10,
  author       = {Sandeep Tamrakar and
                  Jan{-}Erik Ekberg and
                  Pekka Laitinen and
                  N. Asokan and
                  Tuomas Aura},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Can Hand-Held Computers Still Be Better Smart Cards?},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {200--218},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_14},
  doi          = {10.1007/978-3-642-25283-9\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/TamrakarELAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ToeglPG10,
  author       = {Ronald Toegl and
                  Martin Pirker and
                  Michael Gissing},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {acTvSM: {A} Dynamic Virtualization Platform for Enforcement of Application
                  Integrity},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {326--345},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_22},
  doi          = {10.1007/978-3-642-25283-9\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ToeglPG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WalkerL10,
  author       = {Jesse Walker and
                  Jiangtao Li},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Key Exchange with Anonymous Authentication Using {DAA-SIGMA} Protocol},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {108--127},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_8},
  doi          = {10.1007/978-3-642-25283-9\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/WalkerL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Wright10,
  author       = {Craig S. Wright},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Software, Vendors and Reputation: An Analysis of the Dilemma in Creating
                  Secure Software},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {346--360},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_23},
  doi          = {10.1007/978-3-642-25283-9\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Wright10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YangGB10,
  author       = {Yanjiang Yang and
                  Liang Gu and
                  Feng Bao},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using
                  Trusted Computing},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {189--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_13},
  doi          = {10.1007/978-3-642-25283-9\_13},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/YangGB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhangLL10,
  author       = {Yongzhong Zhang and
                  Qi Li and
                  Zhangxi Lin},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {A Novel Reputation Computing Model - (Work-in-Progress)},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {316--325},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_21},
  doi          = {10.1007/978-3-642-25283-9\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhangLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2009,
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14597-1},
  doi          = {10.1007/978-3-642-14597-1},
  isbn         = {978-3-642-14596-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BenteVH09,
  author       = {Ingo Bente and
                  J{\"{o}}rg Vieweg and
                  Josef von Helden},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Privacy Enhanced Trusted Network Connect},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_8},
  doi          = {10.1007/978-3-642-14597-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BenteVH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/CabukCPR09,
  author       = {Serdar Cabuk and
                  Liqun Chen and
                  David Plaquin and
                  Mark Ryan},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Trusted Integrity Measurement and Reporting for Virtualized Platforms},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {180--196},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_11},
  doi          = {10.1007/978-3-642-14597-1\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/CabukCPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/CatuognoDEKRSSSWZ09,
  author       = {Luigi Catuogno and
                  Alexandra Dmitrienko and
                  Konrad Eriksson and
                  Dirk Kuhlmann and
                  Gianluca Ramunno and
                  Ahmad{-}Reza Sadeghi and
                  Steffen Schulz and
                  Matthias Schunter and
                  Marcel Winandy and
                  Jing Zhan},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Trusted Virtual Domains - Design, Implementation and Lessons Learned},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {156--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_10},
  doi          = {10.1007/978-3-642-14597-1\_10},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/CatuognoDEKRSSSWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Dietrich09,
  author       = {Kurt Dietrich},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Anonymous Credentials for Java Enabled Platforms: {A} Performance
                  Evaluation},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_6},
  doi          = {10.1007/978-3-642-14597-1\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Dietrich09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/DuLS09,
  author       = {Zhen{-}Long Du and
                  Xiaoli Li and
                  Kangkang Shen},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Trusted Firmware Services Based on {TPM}},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {227--235},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_14},
  doi          = {10.1007/978-3-642-14597-1\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/DuLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/EkbergA09,
  author       = {Jan{-}Erik Ekberg and
                  N. Asokan},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {External Authenticated Non-volatile Memory with Lifecycle Management
                  for State Protection in Trusted Computing},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {16--38},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_2},
  doi          = {10.1007/978-3-642-14597-1\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/EkbergA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/GuCDDGS09,
  author       = {Liang Gu and
                  Yueqiang Cheng and
                  Xuhua Ding and
                  Robert H. Deng and
                  Yao Guo and
                  Weizhong Shao},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Remote Attestation on Function Execution (Work-in-Progress)},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {60--72},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_4},
  doi          = {10.1007/978-3-642-14597-1\_4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/GuCDDGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/LiZ09,
  author       = {Mengmeng Li and
                  Yong Zhao},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Research on Multistage Interconnection Architecture and Collision
                  Detection Model},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {146--155},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_9},
  doi          = {10.1007/978-3-642-14597-1\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/LiZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/LiaoZS09,
  author       = {Jianhua Liao and
                  Yong Zhao and
                  Changxiang Shen},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {A Feather-Weight Application Isolation Model},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {197--211},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_12},
  doi          = {10.1007/978-3-642-14597-1\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/LiaoZS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ParkerX09,
  author       = {T. Paul Parker and
                  Shouhuai Xu},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {A Method for Safekeeping Cryptographic Keys from Memory Disclosure
                  Attacks},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {39--59},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_3},
  doi          = {10.1007/978-3-642-14597-1\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ParkerX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Shi09,
  author       = {Wenchang Shi},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {On Design of a Trusted Software Base with Support of {TPCM}},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_1},
  doi          = {10.1007/978-3-642-14597-1\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Shi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/TanveerAN09,
  author       = {Tamleek Ali Tanveer and
                  Masoom Alam and
                  Mohammad Nauman},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Scalable Remote Attestation with Privacy Protection},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {73--87},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_5},
  doi          = {10.1007/978-3-642-14597-1\_5},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/TanveerAN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WuLLZ09,
  author       = {Zhongming Wu and
                  Yiyuan Luo and
                  Xuejia Lai and
                  Bo Zhu},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Improved Cryptanalysis of the {FOX} Block Cipher},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {236--249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_15},
  doi          = {10.1007/978-3-642-14597-1\_15},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/WuLLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/XuY09,
  author       = {Shouhuai Xu and
                  Moti Yung},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {SocialClouds: Concept, Security Architecture and Some Mechanisms},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {104--128},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_7},
  doi          = {10.1007/978-3-642-14597-1\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/XuY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YanDNY09,
  author       = {Zheng Yan and
                  Yan Dong and
                  Valtteri Niemi and
                  Guoliang Yu},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Exploring Trust of Mobile Applications Based on User Behaviors},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {212--226},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_13},
  doi          = {10.1007/978-3-642-14597-1\_13},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/YanDNY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhuCL09,
  author       = {Bo Zhu and
                  Kefei Chen and
                  Xuejia Lai},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Bitwise Higher Order Differential Cryptanalysis},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {250--262},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_16},
  doi          = {10.1007/978-3-642-14597-1\_16},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhuCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics