Advertisement

Trusted Systems

6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers

  • Moti Yung
  • Liehuang Zhu
  • Yanjiang Yang
Conference proceedings INTRUST 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9473)

Also part of the Security and Cryptology book sub series (LNSC, volume 9473)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Hiroaki Anada, Junpei Kawamoto, Jian Weng, Kouichi Sakurai
    Pages 1-14
  3. Sampsa Rauti, Samuel Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, Sami Hyrynsalmi, Ville Leppänen
    Pages 15-35
  4. Chao Li, Bo Lang, Jinmiao Wang
    Pages 36-50
  5. Veronika Kuchta, Mark Manulis
    Pages 70-89
  6. Jiaqi Hong, Haixia Xu, Peili Li
    Pages 90-104
  7. Zhenxin Zhan, Maochao Xu, Shouhuai Xu
    Pages 105-126
  8. Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia
    Pages 127-136
  9. JingFeng Xue, Yan Zhang, ChangZhen Hu, HongYu Ren, ZhiQiang Li
    Pages 137-150
  10. Michael Weiß, Benjamin Weggenmann, Moritz August, Georg Sigl
    Pages 151-167
  11. Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
    Pages 168-183
  12. Anbang Ruan, Andrew Martin
    Pages 184-200
  13. Xuezhen Huang, Jiqiang Liu, Zhen Han
    Pages 201-212
  14. Li Wang, Hongda Li, Fei Tang
    Pages 213-227
  15. Przemysław Błaśkiewicz, Marek Klonowski, Mirosław Kutyłowski, Piotr Syga
    Pages 228-242
  16. Martin Hell, Linus Karlsson, Ben Smeets, Jelena Mirosavljevic
    Pages 243-258
  17. Weili Han, Wei Wang, Xinyi Zhang, Weiwei Peng, Zheran Fang
    Pages 259-277
  18. Yan Zhu, Dandan Li, Liguang Yang
    Pages 278-293
  19. Fan Zhang, Liangze Li, Hongfeng Wu
    Pages 310-327
  20. Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
    Pages 346-363
  21. Wenying Zhang, Jiaqi Zhang, Xiangqian Zheng
    Pages 364-373
  22. Yun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang
    Pages 374-393
  23. Chenggen Song, Xin Liu, Yalong Yan
    Pages 394-406
  24. Takashi Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, Kazuo Ohta
    Pages 422-437
  25. Back Matter
    Pages 439-442

About these proceedings

Introduction

Normal 0 false false false EN-US X-NONE X-NONE

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014.

The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.

 

 

/* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}

Keywords

authentication distributed systems security intrusion detection network security trusted computing access control access control elliptic curve embedded systems information accountability key management logic and verification malware multiparty computation privacy-preserving protocols public key cryptography RSA side-channel attacks trust frameworks usage control

Editors and affiliations

  • Moti Yung
    • 1
  • Liehuang Zhu
    • 2
  • Yanjiang Yang
    • 3
  1. 1.GoogleNew YorkUSA
  2. 2.Beijing Institute of TechnologyBeijingChina
  3. 3.Institute for Infocomm ResearchSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-27998-5
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-27997-8
  • Online ISBN 978-3-319-27998-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering