Trusted Computing and Information Security

11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

  • Ming Xu
  • Zheng Qin
  • Fei Yan
  • Shaojing Fu
Conference proceedings CTCIS 2017

Part of the Communications in Computer and Information Science book series (CCIS, volume 704)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Liyan Wang, Jingfeng Xue, Yan Cui, Yong Wang, Chun Shan
    Pages 1-15
  3. Xinfeng He, Junfeng Tian
    Pages 41-52
  4. Fuqiang Di, Junyi Duan, Jia Liu, Guangwei Su, Yingnan Zhang
    Pages 53-65
  5. Zhenyu Guan, Yuyao Qin, Junming Liu
    Pages 66-75
  6. Mingdi Xu, Xueyuan Gao, Yang Gao, Fan Zhang
    Pages 87-96
  7. Jingyi Cui, Jiansheng Guo, Yipeng Liu
    Pages 97-111
  8. Saihua Cai, Ruizhi Sun, Chunming Cheng, Gang Wu
    Pages 112-125
  9. Guolin Shao, Xingshu Chen, Xuemei Zeng, Xueyuan Yin, Xiaoming Ye, Yonggang Luo
    Pages 143-164
  10. Long Wang, Rui Ma, HaoRan Gao, XiaJing Wang, ChangZhen Hu
    Pages 165-180
  11. Liang Pang, Pengze Guo, Zhi Xue, Xiao Chen
    Pages 181-197
  12. Xiao Chen, Liang Pang, Pengze Guo, Xingping Sun, Zhi Xue
    Pages 198-212
  13. Xia Yang, Zheng Yang, Haiyong Sun, Jingyu Liu
    Pages 213-226
  14. Tingting He, Jingfeng Xue, Jianwen Fu, Yong Wang, Chun Shan
    Pages 227-241
  15. Yali Zeng, Li Xu, Xiaoding Wang, Xu Yang
    Pages 242-254
  16. Guangzhi Zhang, Shaobin Cai, Chunhua Ma, Dongqiu Zhang
    Pages 255-274
  17. Biao Liu, Yang Pan, Jiali Li, Huamin Feng
    Pages 290-302
  18. Fei Yan, Yunlong Xing, Shiwei Zhang, Zhihan Yue, Yamin Zheng
    Pages 370-382
  19. Yong Wang, Xuemin Tong, Ming Li, Jingfeng Xue, Ji Zhang, Zhenyan Liu et al.
    Pages 397-408
  20. Back Matter
    Pages 409-410

About these proceedings


This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017.

The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.


Cryptanalysis Information-theoretic security Information-theoretic methods Trust frameworks Security requirements Formal Security models Authentication Access control Privacy-preserving protocols Authorization Social engineering attacks Hardware attacks and countermeasures Mobile security Wireless security Social network security Social network security Privacy Privacy protections

Editors and affiliations

  • Ming Xu
    • 1
  • Zheng Qin
    • 2
  • Fei Yan
    • 3
  • Shaojing Fu
    • 4
  1. 1.National University of Defense TechnologyChangshaChina
  2. 2.Hunan UniversityChangshaChina
  3. 3.Wuhan UniversityWuhanChina
  4. 4.National University of Defense TechnologyChangshaChina

Bibliographic information

Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment