researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2009
2010
2011
2012
2013
2014
2015
2016
Filter by Tag
OR
AND
NOT
1
Java
architecture
design
memory management
mobile
rule-based
security
Filter by Author
[+]
OR
AND
NOT
1
Ahmad-Reza Sadeghi
Alexandra Dmitrienko
Allan Tomlinson
Andrea Saracino
Dengguo Feng
Fabio Martinelli
Jan-Erik Ekberg
Jiangtao Li 0001
Johannes Winter
Kouichi Sakurai
Kurt Dietrich
Liang Gu
Liqun Chen
Marcin Wójcik
Miroslaw Kutylowski
Moti Yung
Przemyslaw Kubiak
Shin'ichiro Matsuo
Shouhuai Xu
Xuejia Lai
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
attestation
computing
conference
december
international
intrust
key
mobile
model
progress
protocol
remote
secure
security
software
systems
trusted
using
work
INTRUST (intrust)
Editions
Publications
Viewing Publication 1 - 100 from 124
2016
Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers
Moti Yung
,
Jian-biao Zhang
,
Zhen Yang
, editors,
Volume 9565 of
Lecture Notes in Computer Science
, Springer,
2016.
[doi]
2015
Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks
Huishan Bian
,
Liehuang Zhu
,
Meng Shen
,
Mingzhong Wang
,
Chang Xu
,
Qiongyu Zhang
.
intrust 2016
:
3-16
[doi]
Public Key Encryption with Distributed Keyword Search
Veronika Kuchta
,
Mark Manulis
.
intrust 2016
:
62-83
[doi]
RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform
Li Lin
,
Jian Ni
,
Jian Hu
,
Jian-biao Zhang
.
intrust 2016
:
214-225
[doi]
Attribute-Based Signatures with Controllable Linkability
Miguel Urquidi
,
Dalia Khader
,
Jean Lancrenon
,
Liqun Chen
.
intrust 2016
:
114-129
[doi]
A Signature Generation Approach Based on Clustering for Polymorphic Worm
Jie Wang
,
Xiaoxian He
.
intrust 2016
:
84-96
[doi]
An Audit Log Protection Mechanism Based on Security Chip
Guan Wang
,
Ziyi Wang
,
Jian Sun
,
Jun Zhou
.
intrust 2016
:
226-233
[doi]
Research on Trusted Bootstrap Based on the Universal Smart Card
Lin Yan
,
Jian-biao Zhang
.
intrust 2016
:
169-182
[doi]
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs
Naoto Yanai
,
Masahiro Mambo
,
Kazuma Tanaka
,
Takashi Nishide
,
Eiji Okamoto
.
intrust 2016
:
32-48
[doi]
A Causality-Based Model for Describing the Trustworthiness of a Computing Device
Jiun Yi Yap
,
Allan Tomlinson
.
intrust 2016
:
130-149
[doi]
Application of NTRU Using Group Rings to Partial Decryption Technique
Takanori Yasuda
,
Hiroaki Anada
,
Kouichi Sakurai
.
intrust 2016
:
203-213
[doi]
Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers
Moti Yung
,
Liehuang Zhu
,
Yanjiang Yang
, editors,
Volume 9473 of
Lecture Notes in Computer Science
, Springer,
2015.
[doi]
Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS
Hui Zhao
,
Kouichi Sakurai
.
intrust 2016
:
99-113
[doi]
An Application-Oriented Efficient Encapsulation System for Trusted Software Development
Zheng-Tao
,
Jun Hu
,
Jing Zhan
,
Mo Li
,
Chunzi Chen
.
intrust 2016
:
153-168
[doi]
Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance
Huafei Zhu
.
intrust 2016
:
17-31
[doi]
Universally Composable Oblivious Database in the Presence of Malicious Adversaries
Huafei Zhu
.
intrust 2016
:
49-61
[doi]
2014
Identity-Embedding Method for Decentralized Public-Key Infrastructure
Hiroaki Anada
,
Junpei Kawamoto
,
Jian Weng
,
Kouichi Sakurai
.
intrust 2015
:
1-14
[doi]
Lightweight Protocol for Trusted Spontaneous Communication
Przemyslaw Blaskiewicz
,
Marek Klonowski
,
Miroslaw Kutylowski
,
Piotr Syga
.
intrust 2015
:
228-242
[doi]
A Simulated Annealing Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors
Dan Ding
,
Guizhen Zhu
.
intrust 2015
:
51-69
[doi]
Template Attacks Based on Priori Knowledge
Guangjun Fan
,
Yongbin Zhou
,
Hailong Zhang
,
Dengguo Feng
.
intrust 2015
:
346-363
[doi]
How to Choose Interesting Points for Template Attacks More Effectively?
Guangjun Fan
,
Yongbin Zhou
,
Hailong Zhang
,
Dengguo Feng
.
intrust 2015
:
168-183
[doi]
Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage
Hua Guo
,
Fangchao Ma
,
Zhoujun Li
,
Chunhe Xia
.
intrust 2015
:
127-136
[doi]
APP Vetting Based on the Consistency of Description and APK
Weili Han
,
Wei Wang
,
Xinyi Zhang
,
Weiwei Peng
,
Zheran Fang
.
intrust 2015
:
259-277
[doi]
Using TPM Secure Storage in Trusted High Availability Systems
Martin Hell
,
Linus Karlsson
,
Ben J. M. Smeets
,
Jelena Mirosavljevic
.
intrust 2015
:
243-258
[doi]
Verifiable Computation of Large Polynomials
Jiaqi Hong
,
Haixia Xu
,
Peili Li
.
intrust 2015
:
90-104
[doi]
A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases
Yun-Ju Huang
,
Wei-Chih Hong
,
Chen-Mou Cheng
,
Jiun-Ming Chen
,
Bo-Yin Yang
.
intrust 2015
:
374-393
[doi]
A Privacy-Aware Access Model on Anonymized Data
Xuezhen Huang
,
Jiqiang Liu
,
Zhen Han
.
intrust 2015
:
201-212
[doi]
Rerandomizable Threshold Blind Signatures
Veronika Kuchta
,
Mark Manulis
.
intrust 2015
:
70-89
[doi]
Outsourced KP-ABE with Enhanced Security
Chao Li
,
Bo Lang
,
Jinmiao Wang
.
intrust 2015
:
36-50
[doi]
Secure (M+1) st-Price Auction with Automatic Tie-Break
Takashi Nishide
,
Mitsugu Iwamoto
,
Atsushi Iwasaki
,
Kazuo Ohta
.
intrust 2015
:
422-437
[doi]
Diversification of System Calls in Linux Binaries
Sampsa Rauti
,
Samuel Laurén
,
Shohreh Hosseinzadeh
,
Jari-Matti Mäkelä
,
Sami Hyrynsalmi
,
Ville Leppänen
.
intrust 2015
:
15-35
[doi]
NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust
Anbang Ruan
,
Andrew Martin
.
intrust 2015
:
184-200
[doi]
Efficient Public Key Encryption with Field-Free Conjunctive Keywords Search
Chenggen Song
,
Xin Liu
,
Yalong Yan
.
intrust 2015
:
394-406
[doi]
mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group
Baoping Tian
,
Fushan Wei
,
Chuangui Ma
.
intrust 2015
:
407-421
[doi]
Functional Signatures from Indistinguishability Obfuscation
Li Wang
,
Hongda Li
,
Fei Tang
.
intrust 2015
:
213-227
[doi]
On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems
Michael Weiß
,
Benjamin Weggenmann
,
Moritz August
,
Georg Sigl
.
intrust 2015
:
151-167
[doi]
Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set
Jingfeng Xue
,
Yan Zhang
,
Changzhen Hu
,
Hongyu Ren
,
Zhiqiang Li
.
intrust 2015
:
137-150
[doi]
SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs
Gaoshou Zhai
,
Tao Guo
,
Jie Huang
.
intrust 2015
:
294-309
[doi]
A Characterization of Cybersecurity Posture from Network Telescope Data
Zhenxin Zhan
,
Maochao Xu
,
Shouhuai Xu
.
intrust 2015
:
105-126
[doi]
Some Observations on the Lightweight Block Cipher Piccolo-80
Wenying Zhang
,
Jiaqi Zhang
,
Xiangqian Zheng
.
intrust 2015
:
364-373
[doi]
Faster Pairing Computation on Jacobi Quartic Curves with High-Degree Twists
Fan Zhang
,
Liangze Li
,
Hongfeng Wu
.
intrust 2015
:
310-327
[doi]
Traitor Tracing Based on Partially-Ordered Hierarchical Encryption
Yan Zhu
,
Dandan Li
,
Liguang Yang
.
intrust 2015
:
278-293
[doi]
DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes
Min Zhu
,
Bibo Tu
,
Ruibang You
,
Yanzhao Li
,
Dan Meng
.
intrust 2015
:
328-345
[doi]
2013
The PACE|CA Protocol for Machine Readable Travel Documents
Jens Bender
,
Marc Fischlin
,
Dennis Kügler
.
intrust 2013
:
17-35
[doi]
Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings
Roderick Bloem
,
Peter Lipp
, editors,
Volume 8292 of
Lecture Notes in Computer Science
, Springer,
2013.
[doi]
A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions
Patrick Koeberl
,
Jiangtao Li 0001
,
Wei Wu
.
intrust 2013
:
36-52
[doi]
Towards Policy Engineering for Attribute-Based Access Control
Leanid Krautsevich
,
Aliaksandr Lazouski
,
Fabio Martinelli
,
Artsiom Yautsiukhin
.
intrust 2013
:
85-102
[doi]
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments
Fabio Martinelli
,
Ilaria Matteucci
,
Andrea Saracino
,
Daniele Sgandurra
.
intrust 2013
:
70-84
[doi]
Active File Integrity Monitoring Using Paravirtualized Filesystems
Michael Velten
,
Sascha Wessel
,
Frederic Stumpf
,
Claudia Eckert
.
intrust 2013
:
53-69
[doi]
Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification
Jiun Yi Yap
,
Allan Tomlinson
.
intrust 2013
:
1-16
[doi]
2012
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes
Ernie Brickell
,
Liqun Chen
,
Jiangtao Li 0001
.
intrust 2012
:
95-111
[doi]
Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers
Liqun Chen
,
Moti Yung
,
Liehuang Zhu
, editors,
Volume 7222 of
Lecture Notes in Computer Science
, Springer,
2012.
[doi]
A Multi-criteria-Based Evaluation of Android Applications
Gianluca Dini
,
Fabio Martinelli
,
Ilaria Matteucci
,
Marinella Petrocchi
,
Andrea Saracino
,
Daniele Sgandurra
.
intrust 2012
:
67-82
[doi]
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees
Lukasz Krzywiecki
,
Przemyslaw Kubiak
,
Miroslaw Kutylowski
.
intrust 2012
:
5-24
[doi]
Establishing Trust between Nodes in Mobile Ad-Hoc Networks
Nicolai Kuntze
,
Carsten Rudolph
,
Janne Paatero
.
intrust 2012
:
48-62
[doi]
Secure Implementation of Asynchronous Method Calls and Futures
Peeter Laud
.
intrust 2012
:
25-47
[doi]
Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards?
Shin'ichiro Matsuo
.
intrust 2012
:
63-64
[doi]
Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings
Chris J. Mitchell
,
Allan Tomlinson
, editors,
Volume 7711 of
Lecture Notes in Computer Science
, Springer,
2012.
[doi]
The Yin and Yang Sides of Embedded Security
Christof Paar
.
intrust 2012
:
112-115
[doi]
Security in the Distributed Internet of Things
Rodrigo Roman
,
Javier Lopez
.
intrust 2012
:
65-66
[doi]
Automatic Analysis of Security Properties of the TPM
Mark Dermot Ryan
.
intrust 2012
:
1-4
[doi]
Security Analysis of an Open Car Immobilizer Protocol Stack
Stefan Tillich
,
Marcin Wójcik
.
intrust 2012
:
83-94
[doi]
2011
Building General Purpose Security Services on Trusted Computing
Chunhua Chen 0002
,
Chris J. Mitchell
,
Shaohua Tang
.
intrust 2012
:
16-31
[doi]
Fault Detection of the MacGuffin Cipher against Differential Fault Attack
Wei Li 0013
,
Dawu Gu
,
Zhiqiang Liu
,
Ya Liu 0001
,
Xiaohu Huang
.
intrust 2012
:
102-112
[doi]
Hash Chains at the Basis of a Secure Reactive Routing Protocol
Thouraya Bouabana-Tebibel
.
intrust 2012
:
258-270
[doi]
A (Corrected) DAA Scheme Using Batch Proof and Verification
Ernie Brickell
,
Liqun Chen
,
Jiangtao Li 0001
.
intrust 2012
:
304-337
[doi]
Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers
Liqun Chen
,
Moti Yung
, editors,
Volume 6802 of
Lecture Notes in Computer Science
, Springer,
2011.
[doi]
A Performance Analysis of Identity-Based Encryption Schemes
Pengqi Cheng
,
Yan Gu
,
Zihong Lv
,
Jianfei Wang
,
Wenlei Zhu
,
Zhen Chen
,
Jiwei Huang
.
intrust 2012
:
289-303
[doi]
Anonymous Ticketing for NFC-Enabled Mobile Phones
David Derler
,
Klaus Potzmader
,
Johannes Winter
,
Kurt Dietrich
.
intrust 2012
:
66-83
[doi]
Mass Transit Ticketing with NFC Mobile Phones
Jan-Erik Ekberg
,
Sandeep Tamrakar
.
intrust 2012
:
48-65
[doi]
MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme
Danilo Gligoroski
,
Rune Steinsmo Ødegård
,
Rune Erlend Jensen
,
Ludovic Perret
,
Jean-Charles Faugère
,
Svein Johan Knapskog
,
Smile Markovski
.
intrust 2012
:
184-203
[doi]
Multicollisions and Graph-Based Hash Functions
Kimmo Halunen
.
intrust 2012
:
156-167
[doi]
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks
Dong Hao
,
Avishek Adhikari
,
Kouichi Sakurai
.
intrust 2012
:
239-257
[doi]
A Technique for Remote Detection of Certain Virtual Machine Monitors
Christopher Jämthagen
,
Martin Hell
,
Ben J. M. Smeets
.
intrust 2012
:
129-137
[doi]
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM
Patrick Koeberl
,
Jiangtao Li
,
Roel Maes
,
Anand Rajan
,
Claire Vishik
,
Marcin Wójcik
.
intrust 2012
:
271-288
[doi]
Enforcing Sticky Policies with TPM and Virtualization
Gina Kounga
,
Liqun Chen
.
intrust 2012
:
32-47
[doi]
Restricted Identification Scheme and Diffie-Hellman Linking Problem
Miroslaw Kutylowski
,
Lukasz Krzywiecki
,
Przemyslaw Kubiak
,
Michal Koza
.
intrust 2012
:
221-238
[doi]
Indifferentiability of Domain Extension Modes for Hash Functions
Yiyuan Luo
,
Xuejia Lai
,
Zheng Gong
.
intrust 2012
:
138-155
[doi]
Multifactor Authenticated Key Renewal
Shin'ichiro Matsuo
,
Daisuke Moriyama
,
Moti Yung
.
intrust 2012
:
204-220
[doi]
A General, Flexible and Efficient Proof of Inclusion and Exclusion
Kun Peng
.
intrust 2012
:
168-183
[doi]
DAA Protocol Analysis and Verification
Yu Qin
,
XiaoBo Chu
,
Dengguo Feng
,
Wei Feng
.
intrust 2012
:
338-350
[doi]
A Flexible Software Development and Emulation Framework for ARM TrustZone
Johannes Winter
,
Paul Wiegele
,
Martin Pirker
,
Ronald Tögl
.
intrust 2012
:
1-15
[doi]
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks
Qinggang Yue
,
Feng Liu
,
Rui Xue
.
intrust 2012
:
84-101
[doi]
Computationally Sound Symbolic Analysis of EAP-TNC Protocol
Zijian Zhang
,
Liehuang Zhu
,
Feng Wang
,
Lejian Liao
,
Cong Guo
,
Hongyuan Wang
.
intrust 2012
:
113-128
[doi]
2010
On Leveraging Stochastic Models for Remote Attestation
Tamleek Ali
,
Mohammad Nauman
,
Xinwen Zhang
.
intrust 2011
:
290-301
[doi]
Interoperable Remote Attestation for VPN Environments - (Work in Progress)
Ingo Bente
,
Bastian Hellmann
,
Joerg Vieweg
,
Josef von Helden
,
Arne Welzel
.
intrust 2011
:
302-315
[doi]
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress
Przemyslaw Blaskiewicz
,
Przemyslaw Kubiak
,
Miroslaw Kutylowski
.
intrust 2011
:
173-188
[doi]
TruWalletM: Secure Web Authentication on Mobile Platforms
Sven Bugiel
,
Alexandra Dmitrienko
,
Kari Kostiainen
,
Ahmad-Reza Sadeghi
,
Marcel Winandy
.
intrust 2011
:
219-236
[doi]
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software
Jean-François Gallais
,
Johann Großschädl
,
Neil Hanley
,
Markus Kasper
,
Marcel Medwed
,
Francesco Regazzoni
,
Jörn-Marc Schmidt
,
Stefan Tillich
,
Marcin Wójcik
.
intrust 2011
:
253-270
[doi]
Modeling TCG-Based Secure Systems with Colored Petri Nets
Liang Gu
,
Yao Guo
,
Yanjiang Yang
,
Feng Bao
,
Hong Mei
.
intrust 2011
:
67-86
[doi]
Measuring Random Tests by Conditional Entropy and Optimal Execution Order
Jialin Huang
,
Xuejia Lai
.
intrust 2011
:
148-159
[doi]
Trusted Subjects Configuration Based on TE Model in MLS Systems
Shangjie Li
,
Yeping He
.
intrust 2011
:
98-107
[doi]
Design and Implementation of Document Access Control Model Based on Role and Security Policy
Liangjian Mao
,
Shuzhen Yao
,
Kai Zhang
,
Kouichi Sakurai
.
intrust 2011
:
26-36
[doi]
An Abstract Model of a Trusted Platform
Cornelius Namiluko
,
Andrew Martin
.
intrust 2011
:
47-66
[doi]
Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks
Andreas Reiter
,
Georg Neubauer
,
Michael Kapfenberger
,
Johannes Winter
,
Kurt Dietrich
.
intrust 2011
:
1-25
[doi]
Information Flow Graph: An Approach to Identifying Covert Storage Channels
Xiangmei Song
,
Shiguang Ju
,
Chang-da Wang
,
Conghua Zhou
.
intrust 2011
:
87-97
[doi]
Can Hand-Held Computers Still Be Better Smart Cards?
Sandeep Tamrakar
,
Jan-Erik Ekberg
,
Pekka Laitinen
,
N. Asokan
,
Tuomas Aura
.
intrust 2011
:
200-218
[doi]
Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol
Jesse Walker
,
Jiangtao Li 0001
.
intrust 2011
:
108-127
[doi]
Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure Software
Craig S. Wright
.
intrust 2011
:
346-360
[doi]
Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing
Yanjiang Yang
,
Liang Gu
,
Feng Bao
.
intrust 2011
:
189-199
[doi]
Sign in
or
sign up
to see more results.