Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Moti Yung, Jian-biao Zhang, Zhen Yang (eds.) |
Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers |
INTRUST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen 0002 |
Attribute-Based Signatures with Controllable Linkability. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jie Wang 0067, Xiaoxian He |
A Signature Generation Approach Based on Clustering for Polymorphic Worm. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto |
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huishan Bian, Liehuang Zhu, Meng Shen 0001, Mingzhong Wang, Chang Xu 0004, Qiongyu Zhang |
Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Veronika Kuchta, Mark Manulis |
Public Key Encryption with Distributed Keyword Search. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lin Yan, Jian-biao Zhang |
Research on Trusted Bootstrap Based on the Universal Smart Card. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Antonio de la Piedra |
Efficient Implementation of AND, OR and NOT Operators for ABCs. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai |
Application of NTRU Using Group Rings to Partial Decryption Technique. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guan Wang, Ziyi Wang, Jian Sun, Jun Zhou |
An Audit Log Protection Mechanism Based on Security Chip. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hui Zhao, Kouichi Sakurai |
Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Li Lin 0008, Jian Ni, Jian Hu, Jian-biao Zhang |
RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Moti Yung, Liehuang Zhu, Yanjiang Yang (eds.) |
Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu |
Universally Composable Oblivious Database in the Presence of Malicious Adversaries. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu |
Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jiun Yi Yap, Allan Tomlinson |
A Causality-Based Model for Describing the Trustworthiness of a Computing Device. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Tao, Jun Hu, Jing Zhan, Mo Li, Chunzi Chen |
An Application-Oriented Efficient Encapsulation System for Trusted Software Development. |
INTRUST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Martin Hell, Linus Karlsson, Ben J. M. Smeets, Jelena Mirosavljevic |
Using TPM Secure Storage in Trusted High Availability Systems. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia |
Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Takashi Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, Kazuo Ohta |
Secure (M+1) st-Price Auction with Automatic Tie-Break. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chao Li, Bo Lang, Jinmiao Wang |
Outsourced KP-ABE with Enhanced Security. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang |
A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guangjun Fan, Yongbin Zhou, Hailong Zhang 0001, Dengguo Feng |
Template Attacks Based on Priori Knowledge. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jiaqi Hong, Haixia Xu 0002, Peili Li |
Verifiable Computation of Large Polynomials. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhenxin Zhan, Maochao Xu, Shouhuai Xu |
A Characterization of Cybersecurity Posture from Network Telescope Data. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Li Wang, Hongda Li 0001, Fei Tang |
Functional Signatures from Indistinguishability Obfuscation. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Veronika Kuchta, Mark Manulis |
Rerandomizable Threshold Blind Signatures. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dan Ding, Guizhen Zhu |
A Simulated Annealing Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chenggen Song, Xin Liu, Yalong Yan |
Efficient Public Key Encryption with Field-Free Conjunctive Keywords Search. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guangjun Fan, Yongbin Zhou, Hailong Zhang 0001, Dengguo Feng |
How to Choose Interesting Points for Template Attacks More Effectively? |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li |
Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fan Zhang, Liangze Li, Hongfeng Wu |
Faster Pairing Computation on Jacobi Quartic Curves with High-Degree Twists. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yan Zhu 0010, Dandan Li, Liguang Yang |
Traitor Tracing Based on Partially-Ordered Hierarchical Encryption. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Weiß, Benjamin Weggenmann, Moritz August, Georg Sigl |
On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Anada, Junpei Kawamoto, Jian Weng 0001, Kouichi Sakurai |
Identity-Embedding Method for Decentralized Public-Key Infrastructure. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xuezhen Huang, Jiqiang Liu, Zhen Han |
A Privacy-Aware Access Model on Anonymized Data. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Baoping Tian, Fushan Wei, Chuangui Ma |
mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski, Piotr Syga |
Lightweight Protocol for Trusted Spontaneous Communication. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anbang Ruan, Andrew P. Martin |
NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng |
DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wenying Zhang, Jiaqi Zhang, Xiangqian Zheng |
Some Observations on the Lightweight Block Cipher Piccolo-80. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weili Han, Wei Wang, Xinyi Zhang, Weiwei Peng, Zheran Fang |
APP Vetting Based on the Consistency of Description and APK. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gaoshou Zhai, Tao Guo, Jie Huang |
SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sampsa Rauti, Samuel Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, Sami Hyrynsalmi, Ville Leppänen |
Diversification of System Calls in Linux Binaries. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jens Bender, Marc Fischlin, Dennis Kügler |
The PACE|CA Protocol for Machine Readable Travel Documents. |
INTRUST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Koeberl, Jiangtao Li 0001, Wei Wu 0024 |
A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions. |
INTRUST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Velten, Sascha Wessel, Frederic Stumpf, Claudia Eckert 0001 |
Active File Integrity Monitoring Using Paravirtualized Filesystems. |
INTRUST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jiun Yi Yap, Allan Tomlinson |
Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification. |
INTRUST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra |
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments. |
INTRUST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Roderick Bloem, Peter Lipp (eds.) |
Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings |
INTRUST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin |
Towards Policy Engineering for Attribute-Based Access Control. |
INTRUST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen, Moti Yung, Liehuang Zhu (eds.) |
Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mark Dermot Ryan |
Automatic Analysis of Security Properties of the TPM. |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christof Paar |
The Yin and Yang Sides of Embedded Security. |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes. |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nicolai Kuntze, Carsten Rudolph, Janne Paatero |
Establishing Trust between Nodes in Mobile Ad-Hoc Networks. |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra |
A Multi-criteria-Based Evaluation of Android Applications. |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lukasz Krzywiecki, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Tillich, Marcin Wójcik |
Security Analysis of an Open Car Immobilizer Protocol Stack. |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rodrigo Roman, Javier López 0001 |
Security in the Distributed Internet of Things. |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chris J. Mitchell, Allan Tomlinson (eds.) |
Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peeter Laud |
Secure Implementation of Asynchronous Method Calls and Futures. |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shin'ichiro Matsuo |
Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards? |
INTRUST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dong Hao, Avishek Adhikari, Kouichi Sakurai |
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A (Corrected) DAA Scheme Using Batch Proof and Verification. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qinggang Yue, Feng Liu 0001, Rui Xue 0001 |
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Koeberl, Jiangtao Li 0001, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik |
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng |
A General, Flexible and Efficient Proof of Inclusion and Exclusion. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yiyuan Luo, Xuejia Lai, Zheng Gong |
Indifferentiability of Domain Extension Modes for Hash Functions. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Miroslaw Kutylowski, Lukasz Krzywiecki, Przemyslaw Kubiak 0001, Michal Koza |
Restricted Identification Scheme and Diffie-Hellman Linking Problem. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Winter, Paul Wiegele, Martin Pirker, Ronald Tögl |
A Flexible Software Development and Emulation Framework for ARM TrustZone. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David Derler, Klaus Potzmader, Johannes Winter, Kurt Dietrich |
Anonymous Ticketing for NFC-Enabled Mobile Phones. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Jämthagen, Martin Hell, Ben J. M. Smeets |
A Technique for Remote Detection of Certain Virtual Machine Monitors. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jan-Erik Ekberg, Sandeep Tamrakar |
Mass Transit Ticketing with NFC Mobile Phones. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gina Kounga, Liqun Chen 0002 |
Enforcing Sticky Policies with TPM and Virtualization. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pengqi Cheng, Yan Gu 0011, Zihong Lv, Jianfei Wang, Wenlei Zhu, Zhen Chen, Jiwei Huang |
A Performance Analysis of Identity-Based Encryption Schemes. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thouraya Bouabana-Tebibel |
Hash Chains at the Basis of a Secure Reactive Routing Protocol. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski |
MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zijian Zhang 0001, Liehuang Zhu, Feng Wang, Lejian Liao, Cong Guo 0001, Hongyuan Wang |
Computationally Sound Symbolic Analysis of EAP-TNC Protocol. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chunhua Chen 0002, Chris J. Mitchell, Shaohua Tang |
Building General Purpose Security Services on Trusted Computing. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shin'ichiro Matsuo, Daisuke Moriyama, Moti Yung |
Multifactor Authenticated Key Renewal. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu Qin, XiaoBo Chu, Dengguo Feng, Wei Feng |
DAA Protocol Analysis and Verification. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kimmo Halunen |
Multicollisions and Graph-Based Hash Functions. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen, Moti Yung (eds.) |
Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wei Li 0013, Dawu Gu, Zhiqiang Liu 0001, Ya Liu 0001, Xiaohu Huang |
Fault Detection of the MacGuffin Cipher against Differential Fault Attack. |
INTRUST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jesse Walker, Jiangtao Li 0001 |
Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol. |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yongzhong Zhang, Qi Li, Zhangxi Lin |
A Novel Reputation Computing Model - (Work-in-Progress). |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiangmei Song, Shiguang Ju, Changda Wang 0001, Conghua Zhou |
Information Flow Graph: An Approach to Identifying Covert Storage Channels. |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Liang Gu, Feng Bao 0001 |
Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing. |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan, Tuomas Aura |
Can Hand-Held Computers Still Be Better Smart Cards? |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cornelius Namiluko, Andrew P. Martin |
An Abstract Model of a Trusted Platform. |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shangjie Li, Yeping He |
Trusted Subjects Configuration Based on TE Model in MLS Systems. |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen, Moti Yung (eds.) |
Trusted Systems, First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Reiter, Georg Neubauer, Michael Kapfenberger, Johannes Winter, Kurt Dietrich |
Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks. |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Przemyslaw Blaskiewicz, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dong Hao, Yizhi Ren, Kouichi Sakurai |
A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress). |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liang Gu, Yao Guo 0001, Yanjiang Yang, Feng Bao 0001, Hong Mei 0001 |
Modeling TCG-Based Secure Systems with Colored Petri Nets. |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Toegl, Martin Pirker, Michael Gissing |
acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ingo Bente, Bastian Hellmann, Jörg Vieweg, Josef von Helden, Arne Welzel |
Interoperable Remote Attestation for VPN Environments - (Work in Progress). |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002, Jiangtao Li 0001 |
Revocation of Direct Anonymous Attestation. |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|