


default search action
4. INTRUST 2012: London, UK
- Chris J. Mitchell

, Allan Tomlinson:
Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Lecture Notes in Computer Science 7711, Springer 2012, ISBN 978-3-642-35370-3
Session 1: Automated Analysis
- Mark Dermot Ryan

:
Automatic Analysis of Security Properties of the TPM. 1-4
Session 2: Security and Trust
- Lukasz Krzywiecki

, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. 5-24 - Peeter Laud

:
Secure Implementation of Asynchronous Method Calls and Futures. 25-47 - Nicolai Kuntze, Carsten Rudolph

, Janne Paatero:
Establishing Trust between Nodes in Mobile Ad-Hoc Networks. 48-62
Session 3: Mobile Trust
- Shin'ichiro Matsuo:

Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards? 63-64
Session 4: Security of Distributed Systems
- Rodrigo Roman, Javier López

:
Security in the Distributed Internet of Things. 65-66
Session 5: Evaluation and Analysis
- Gianluca Dini

, Fabio Martinelli, Ilaria Matteucci
, Marinella Petrocchi, Andrea Saracino
, Daniele Sgandurra:
A Multi-criteria-Based Evaluation of Android Applications. 67-82 - Stefan Tillich, Marcin Wójcik:

Security Analysis of an Open Car Immobilizer Protocol Stack. 83-94 - Ernie Brickell, Liqun Chen

, Jiangtao Li:
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes. 95-111
Session 6: Embedded Security
- Christof Paar:

The Yin and Yang Sides of Embedded Security. 112-115

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














