Trusted Systems

Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers

  • Liqun Chen
  • Moti Yung
  • Liehuang Zhu

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7222)

Table of contents

  1. Front Matter
  2. Trusted Services

    1. Johannes Winter, Paul Wiegele, Martin Pirker, Ronald Tögl
      Pages 1-15
    2. Chunhua Chen, Chris J. Mitchell, Shaohua Tang
      Pages 16-31
    3. Gina Kounga, Liqun Chen
      Pages 32-47
  3. Mobile Trusted Systems

    1. Jan-Erik Ekberg, Sandeep Tamrakar
      Pages 48-65
    2. David Derler, Klaus Potzmader, Johannes Winter, Kurt Dietrich
      Pages 66-83
  4. Security Analysis

    1. Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, Xiaohu Huang
      Pages 102-112
    2. Zijian Zhang, Liehuang Zhu, Feng Wang, Lejian Liao, Cong Guo, Hongyuan Wang
      Pages 113-128
    3. Christopher Jämthagen, Martin Hell, Ben Smeets
      Pages 129-137
  5. Cryptographic Aspects

    1. Yiyuan Luo, Xuejia Lai, Zheng Gong
      Pages 138-155
    2. Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog et al.
      Pages 184-203
    3. Shin’ichiro Matsuo, Daisuke Moriyama, Moti Yung
      Pages 204-220
    4. Mirosław Kutyłowski, Łukasz Krzywiecki, Przemysław Kubiak, Michał Koza
      Pages 221-238
  6. Trusted Networks

    1. Dong Hao, Avishek Adhikari, Kouichi Sakurai
      Pages 239-257
    2. Thouraya Bouabana-Tebibel
      Pages 258-270
  7. Implementation

    1. Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik
      Pages 271-288
    2. Pengqi Cheng, Yan Gu, Zihong Lv, Jianfei Wang, Wenlei Zhu, Zhen Chen et al.
      Pages 289-303

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.

Keywords

authentication encryption hash functions mobile phones protocols

Editors and affiliations

  • Liqun Chen
    • 1
  • Moti Yung
    • 2
  • Liehuang Zhu
    • 3
  1. 1.Hewlett-Packard LaboratoriesStoke GiffordUK
  2. 2.Computer Science DepartmentColumbia UniversityNew YorkUSA
  3. 3.Institute of Technology, Beijing Key Lab of Intelligent Information TechnologyBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-32298-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-32297-6
  • Online ISBN 978-3-642-32298-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace