default search action
4. INTRUST 2012: London, UK
- Chris J. Mitchell, Allan Tomlinson:
Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Lecture Notes in Computer Science 7711, Springer 2012, ISBN 978-3-642-35370-3
Session 1: Automated Analysis
- Mark Dermot Ryan:
Automatic Analysis of Security Properties of the TPM. 1-4
Session 2: Security and Trust
- Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. 5-24 - Peeter Laud:
Secure Implementation of Asynchronous Method Calls and Futures. 25-47 - Nicolai Kuntze, Carsten Rudolph, Janne Paatero:
Establishing Trust between Nodes in Mobile Ad-Hoc Networks. 48-62
Session 3: Mobile Trust
- Shin'ichiro Matsuo:
Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards? 63-64
Session 4: Security of Distributed Systems
- Rodrigo Roman, Javier López:
Security in the Distributed Internet of Things. 65-66
Session 5: Evaluation and Analysis
- Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra:
A Multi-criteria-Based Evaluation of Android Applications. 67-82 - Stefan Tillich, Marcin Wójcik:
Security Analysis of an Open Car Immobilizer Protocol Stack. 83-94 - Ernie Brickell, Liqun Chen, Jiangtao Li:
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes. 95-111
Session 6: Embedded Security
- Christof Paar:
The Yin and Yang Sides of Embedded Security. 112-115
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.