


default search action
7. INTRUST 2015: Beijing, China
- Moti Yung, Jian-biao Zhang, Zhen Yang:

Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9565, Springer 2016, ISBN 978-3-319-31549-2
Encryptions and Signatures
- Huishan Bian, Liehuang Zhu, Meng Shen, Mingzhong Wang

, Chang Xu
, Qiongyu Zhang:
Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks. 3-16 - Huafei Zhu:

Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance. 17-31 - Naoto Yanai

, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto:
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. 32-48 - Huafei Zhu:

Universally Composable Oblivious Database in the Presence of Malicious Adversaries. 49-61 - Veronika Kuchta, Mark Manulis

:
Public Key Encryption with Distributed Keyword Search. 62-83 - Jie Wang, Xiaoxian He:

A Signature Generation Approach Based on Clustering for Polymorphic Worm. 84-96
Security Model
- Hui Zhao, Kouichi Sakurai:

Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS. 99-113 - Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen

:
Attribute-Based Signatures with Controllable Linkability. 114-129 - Jiun Yi Yap, Allan Tomlinson:

A Causality-Based Model for Describing the Trustworthiness of a Computing Device. 130-149
Trusted Technologies
- Zheng Tao, Jun Hu, Jing Zhan, Mo Li, Chunzi Chen:

An Application-Oriented Efficient Encapsulation System for Trusted Software Development. 153-168 - Lin Yan, Jian-biao Zhang:

Research on Trusted Bootstrap Based on the Universal Smart Card. 169-182 - Antonio de la Piedra

:
Efficient Implementation of AND, OR and NOT Operators for ABCs. 183-199
Software and System Security
- Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai:

Application of NTRU Using Group Rings to Partial Decryption Technique. 203-213 - Li Lin, Jian Ni, Jian Hu, Jian-biao Zhang:

RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform. 214-225 - Guan Wang, Ziyi Wang, Jian Sun, Jun Zhou:

An Audit Log Protection Mechanism Based on Security Chip. 226-233

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














