


default search action
4. INTRUST 2012: London, UK
- Chris J. Mitchell
, Allan Tomlinson:
Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Lecture Notes in Computer Science 7711, Springer 2012, ISBN 978-3-642-35370-3
Session 1: Automated Analysis
- Mark Dermot Ryan
:
Automatic Analysis of Security Properties of the TPM. 1-4
Session 2: Security and Trust
- Lukasz Krzywiecki
, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. 5-24 - Peeter Laud
:
Secure Implementation of Asynchronous Method Calls and Futures. 25-47 - Nicolai Kuntze, Carsten Rudolph
, Janne Paatero:
Establishing Trust between Nodes in Mobile Ad-Hoc Networks. 48-62
Session 3: Mobile Trust
- Shin'ichiro Matsuo:
Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards? 63-64
Session 4: Security of Distributed Systems
- Rodrigo Roman, Javier López
:
Security in the Distributed Internet of Things. 65-66
Session 5: Evaluation and Analysis
- Gianluca Dini
, Fabio Martinelli, Ilaria Matteucci
, Marinella Petrocchi, Andrea Saracino
, Daniele Sgandurra:
A Multi-criteria-Based Evaluation of Android Applications. 67-82 - Stefan Tillich, Marcin Wójcik:
Security Analysis of an Open Car Immobilizer Protocol Stack. 83-94 - Ernie Brickell, Liqun Chen
, Jiangtao Li:
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes. 95-111
Session 6: Embedded Security
- Christof Paar:
The Yin and Yang Sides of Embedded Security. 112-115

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.