![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
3. INTRUST 2011: Beijing, China
- Liqun Chen, Moti Yung, Liehuang Zhu:
Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7222, Springer 2012, ISBN 978-3-642-32297-6
Trusted Services
- Johannes Winter, Paul Wiegele, Martin Pirker
, Ronald Tögl:
A Flexible Software Development and Emulation Framework for ARM TrustZone. 1-15 - Chunhua Chen, Chris J. Mitchell
, Shaohua Tang:
Building General Purpose Security Services on Trusted Computing. 16-31 - Gina Kounga, Liqun Chen
:
Enforcing Sticky Policies with TPM and Virtualization. 32-47
Mobile Trusted Systems
- Jan-Erik Ekberg, Sandeep Tamrakar:
Mass Transit Ticketing with NFC Mobile Phones. 48-65 - David Derler
, Klaus Potzmader, Johannes Winter, Kurt Dietrich:
Anonymous Ticketing for NFC-Enabled Mobile Phones. 66-83
Security Analysis
- Qinggang Yue, Feng Liu, Rui Xue:
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks. 84-101 - Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, Xiaohu Huang:
Fault Detection of the MacGuffin Cipher against Differential Fault Attack. 102-112 - Zijian Zhang, Liehuang Zhu, Feng Wang, Lejian Liao, Cong Guo, Hongyuan Wang:
Computationally Sound Symbolic Analysis of EAP-TNC Protocol. 113-128 - Christopher Jämthagen, Martin Hell
, Ben J. M. Smeets:
A Technique for Remote Detection of Certain Virtual Machine Monitors. 129-137
Cryptographic Aspects
- Yiyuan Luo, Xuejia Lai, Zheng Gong:
Indifferentiability of Domain Extension Modes for Hash Functions. 138-155 - Kimmo Halunen:
Multicollisions and Graph-Based Hash Functions. 156-167 - Kun Peng:
A General, Flexible and Efficient Proof of Inclusion and Exclusion. 168-183 - Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski:
MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme. 184-203 - Shin'ichiro Matsuo, Daisuke Moriyama, Moti Yung:
Multifactor Authenticated Key Renewal. 204-220 - Miroslaw Kutylowski, Lukasz Krzywiecki
, Przemyslaw Kubiak
, Michal Koza:
Restricted Identification Scheme and Diffie-Hellman Linking Problem. 221-238
Trusted Networks
- Dong Hao, Avishek Adhikari, Kouichi Sakurai:
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks. 239-257 - Thouraya Bouabana-Tebibel:
Hash Chains at the Basis of a Secure Reactive Routing Protocol. 258-270
Implementation
- Patrick Koeberl, Jiangtao Li, Roel Maes
, Anand Rajan, Claire Vishik, Marcin Wójcik:
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM. 271-288 - Pengqi Cheng, Yan Gu, Zihong Lv, Jianfei Wang, Wenlei Zhu, Zhen Chen, Jiwei Huang:
A Performance Analysis of Identity-Based Encryption Schemes. 289-303
Direct Anonymous Attestation
- Ernie Brickell, Liqun Chen
, Jiangtao Li:
A (Corrected) DAA Scheme Using Batch Proof and Verification. 304-337 - Yu Qin, XiaoBo Chu, Dengguo Feng, Wei Feng:
DAA Protocol Analysis and Verification. 338-350
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.