default search action
7. INTRUST 2015: Beijing, China
- Moti Yung, Jian-biao Zhang, Zhen Yang:
Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9565, Springer 2016, ISBN 978-3-319-31549-2
Encryptions and Signatures
- Huishan Bian, Liehuang Zhu, Meng Shen, Mingzhong Wang, Chang Xu, Qiongyu Zhang:
Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks. 3-16 - Huafei Zhu:
Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance. 17-31 - Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto:
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. 32-48 - Huafei Zhu:
Universally Composable Oblivious Database in the Presence of Malicious Adversaries. 49-61 - Veronika Kuchta, Mark Manulis:
Public Key Encryption with Distributed Keyword Search. 62-83 - Jie Wang, Xiaoxian He:
A Signature Generation Approach Based on Clustering for Polymorphic Worm. 84-96
Security Model
- Hui Zhao, Kouichi Sakurai:
Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS. 99-113 - Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen:
Attribute-Based Signatures with Controllable Linkability. 114-129 - Jiun Yi Yap, Allan Tomlinson:
A Causality-Based Model for Describing the Trustworthiness of a Computing Device. 130-149
Trusted Technologies
- Zheng Tao, Jun Hu, Jing Zhan, Mo Li, Chunzi Chen:
An Application-Oriented Efficient Encapsulation System for Trusted Software Development. 153-168 - Lin Yan, Jian-biao Zhang:
Research on Trusted Bootstrap Based on the Universal Smart Card. 169-182 - Antonio de la Piedra:
Efficient Implementation of AND, OR and NOT Operators for ABCs. 183-199
Software and System Security
- Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai:
Application of NTRU Using Group Rings to Partial Decryption Technique. 203-213 - Li Lin, Jian Ni, Jian Hu, Jian-biao Zhang:
RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform. 214-225 - Guan Wang, Ziyi Wang, Jian Sun, Jun Zhou:
An Audit Log Protection Mechanism Based on Security Chip. 226-233
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.