Trusted systems third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised selected papers /

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except...

Full description

Corporate Authors: INTRUST (Conference) Beijing, China)
Other Authors: INTRUST (Conference), Chen, Liqun., Yung, Moti., Zhu, Liehuang., SpringerLink (Online service)
Format: eBook
Language: English
Published: Berlin ; New York : Springer, ©2012.
Berlin ; New York : [2012]
Physical Description: 1 online resource (xii, 350 pages) : illustrations.
Series: Lecture notes in computer science ; 7222.
LNCS sublibrary. Security and cryptology.
Subjects:
Table of Contents:
  • A Flexible Software Development and Emulation Framework for ARM TrustZone /
  • Johannes Winter, Paul Wiegele, Martin Pirker and Ronald Tögl
  • Building General Purpose Security Services on Trusted Computing /
  • Chunhua Chen, Chris J. Mitchell and Shaohua Tang
  • Enforcing Sticky Policies with TPM and Virtualization /
  • Gina Kounga and Liqun Chen
  • Mass Transit Ticketing with NFC Mobile Phones /
  • Jan-Erik Ekberg and Sandeep Tamrakar
  • Anonymous Ticketing for NFC-Enabled Mobile Phones /
  • David Derler, Klaus Potzmader, Johannes Winter and Kurt Dietrich
  • Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks /
  • Qinggang Yue, Feng Liu and Rui Xue
  • Fault Detection of the MacGuffin Cipher against Differential Fault Attack /
  • Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu and Xiaohu Huang
  • Computationally Sound Symbolic Analysis of EAP-TNC Protocol /
  • Zijian Zhang, Liehuang Zhu, Feng Wang, Lejian Liao and Cong Guo, et al.
  • A Technique for Remote Detection of Certain Virtual Machine Monitors /
  • Christopher Jämthagen, Martin Hell and Ben Smeets
  • Indifferentiability of Domain Extension Modes for Hash Functions /
  • Yiyuan Luo, Xuejia Lai and Zheng Gong
  • Multicollisions and Graph-Based Hash Functions /
  • Kimmo Halunen
  • A General, Flexible and Efficient Proof of Inclusion and Exclusion /
  • Kun Peng
  • MQQ-SIG: An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme /
  • Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret and Jean-Charles Faugère, et al.
  • Multifactor Authenticated Key Renewal /
  • Shin'ichiro Matsuo, Daisuke Moriyama and Moti Yung
  • Restricted Identification Scheme and Diffie-Hellman Linking Problem /
  • Mirosław Kutyłowski, Łukasz Krzywiecki, Przemysław Kubiak and Michał Koza
  • Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks /
  • Dong Hao, Avishek Adhikari and Kouichi Sakurai
  • Hash Chains at the Basis of a Secure Reactive Routing Protocol /
  • Thouraya Bouabana-Tebibel
  • Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM /
  • Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan and Claire Vishik, et al.
  • A Performance Analysis of Identity-Based Encryption Schemes /
  • Pengqi Cheng, Yan Gu, Zihong Lv, Jianfei Wang and Wenlei Zhu, et al.
  • A (Corrected) DAA Scheme Using Batch Proof and Verification /
  • Ernie Brickell, Liqun Chen and Jiangtao Li
  • DAA Protocol Analysis and Verification /
  • Yu Qin, Xiaobo Chu, Dengguo Feng and Wei Feng.