default search action
1. INTRUST 2009: Beijing, China
- Liqun Chen, Moti Yung:
Trusted Systems, First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers. Lecture Notes in Computer Science 6163, Springer 2010, ISBN 978-3-642-14596-4
Invited Talk
- Wenchang Shi:
On Design of a Trusted Software Base with Support of TPCM. 1-15
Secure Storage
- Jan-Erik Ekberg, N. Asokan:
External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing. 16-38 - T. Paul Parker, Shouhuai Xu:
A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks. 39-59
Attestation
- Liang Gu, Yueqiang Cheng, Xuhua Ding, Robert H. Deng, Yao Guo, Weizhong Shao:
Remote Attestation on Function Execution (Work-in-Progress). 60-72 - Tamleek Ali Tanveer, Masoom Alam, Mohammad Nauman:
Scalable Remote Attestation with Privacy Protection. 73-87 - Kurt Dietrich:
Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation. 88-103
Trusted Network
- Shouhuai Xu, Moti Yung:
SocialClouds: Concept, Security Architecture and Some Mechanisms. 104-128 - Ingo Bente, Jörg Vieweg, Josef von Helden:
Privacy Enhanced Trusted Network Connect. 129-145 - Mengmeng Li, Yong Zhao:
Research on Multistage Interconnection Architecture and Collision Detection Model. 146-155
Virtualization
- Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan:
Trusted Virtual Domains - Design, Implementation and Lessons Learned. 156-179 - Serdar Cabuk, Liqun Chen, David Plaquin, Mark Ryan:
Trusted Integrity Measurement and Reporting for Virtualized Platforms. 180-196
Applications
- Jianhua Liao, Yong Zhao, Changxiang Shen:
A Feather-Weight Application Isolation Model. 197-211 - Zheng Yan, Yan Dong, Valtteri Niemi, Guoliang Yu:
Exploring Trust of Mobile Applications Based on User Behaviors. 212-226 - Zhen-Long Du, Xiaoli Li, Kangkang Shen:
Trusted Firmware Services Based on TPM. 227-235
Supporting Technology
- Zhongming Wu, Yiyuan Luo, Xuejia Lai, Bo Zhu:
Improved Cryptanalysis of the FOX Block Cipher. 236-249 - Bo Zhu, Kefei Chen, Xuejia Lai:
Bitwise Higher Order Differential Cryptanalysis. 250-262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.