


default search action
6. INTRUST 2014: Beijing, China
- Moti Yung, Liehuang Zhu, Yanjiang Yang:

Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers. Lecture Notes in Computer Science 9473, Springer 2015, ISBN 978-3-319-27997-8 - Hiroaki Anada, Junpei Kawamoto, Jian Weng

, Kouichi Sakurai:
Identity-Embedding Method for Decentralized Public-Key Infrastructure. 1-14 - Sampsa Rauti, Samuel Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, Sami Hyrynsalmi

, Ville Leppänen
:
Diversification of System Calls in Linux Binaries. 15-35 - Chao Li, Bo Lang, Jinmiao Wang:

Outsourced KP-ABE with Enhanced Security. 36-50 - Dan Ding, Guizhen Zhu:

A Simulated Annealing Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors. 51-69 - Veronika Kuchta, Mark Manulis

:
Rerandomizable Threshold Blind Signatures. 70-89 - Jiaqi Hong, Haixia Xu, Peili Li:

Verifiable Computation of Large Polynomials. 90-104 - Zhenxin Zhan, Maochao Xu, Shouhuai Xu:

A Characterization of Cybersecurity Posture from Network Telescope Data. 105-126 - Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia:

Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage. 127-136 - Jingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li:

Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set. 137-150 - Michael Weiß

, Benjamin Weggenmann, Moritz August, Georg Sigl:
On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems. 151-167 - Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:

How to Choose Interesting Points for Template Attacks More Effectively? 168-183 - Anbang Ruan, Andrew P. Martin:

NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust. 184-200 - Xuezhen Huang, Jiqiang Liu, Zhen Han:

A Privacy-Aware Access Model on Anonymized Data. 201-212 - Li Wang, Hongda Li, Fei Tang:

Functional Signatures from Indistinguishability Obfuscation. 213-227 - Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski, Piotr Syga

:
Lightweight Protocol for Trusted Spontaneous Communication. 228-242 - Martin Hell

, Linus Karlsson, Ben J. M. Smeets, Jelena Mirosavljevic:
Using TPM Secure Storage in Trusted High Availability Systems. 243-258 - Weili Han, Wei Wang, Xinyi Zhang, Weiwei Peng, Zheran Fang:

APP Vetting Based on the Consistency of Description and APK. 259-277 - Yan Zhu

, Dandan Li, Liguang Yang:
Traitor Tracing Based on Partially-Ordered Hierarchical Encryption. 278-293 - Gaoshou Zhai, Tao Guo, Jie Huang:

SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs. 294-309 - Fan Zhang, Liangze Li, Hongfeng Wu

:
Faster Pairing Computation on Jacobi Quartic Curves with High-Degree Twists. 310-327 - Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng:

DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes. 328-345 - Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:

Template Attacks Based on Priori Knowledge. 346-363 - Wenying Zhang, Jiaqi Zhang, Xiangqian Zheng:

Some Observations on the Lightweight Block Cipher Piccolo-80. 364-373 - Yun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang:

A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases. 374-393 - Chenggen Song, Xin Liu, Yalong Yan:

Efficient Public Key Encryption with Field-Free Conjunctive Keywords Search. 394-406 - Baoping Tian, Fushan Wei, Chuangui Ma:

mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group. 407-421 - Takashi Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, Kazuo Ohta:

Secure (M+1) st-Price Auction with Automatic Tie-Break. 422-437

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














