Abstract is missing.
- On Design of a Trusted Software Base with Support of TPCMWenchang Shi. 1-15 [doi]
- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted ComputingJan-Erik Ekberg, N. Asokan. 16-38 [doi]
- A Method for Safekeeping Cryptographic Keys from Memory Disclosure AttacksT. Paul Parker, Shouhuai Xu. 39-59 [doi]
- Remote Attestation on Function Execution (Work-in-Progress)Liang Gu, Yueqiang Cheng, Xuhua Ding, Robert H. Deng, Yao Guo, Weizhong Shao. 60-72 [doi]
- Scalable Remote Attestation with Privacy ProtectionTamleek Ali Tanveer, Masoom Alam, Mohammad Nauman. 73-87 [doi]
- Anonymous Credentials for Java Enabled Platforms: A Performance EvaluationKurt Dietrich. 88-103 [doi]
- SocialClouds: Concept, Security Architecture and Some MechanismsShouhuai Xu, Moti Yung. 104-128 [doi]
- Privacy Enhanced Trusted Network ConnectIngo Bente, Joerg Vieweg, Josef von Helden. 129-145 [doi]
- Research on Multistage Interconnection Architecture and Collision Detection ModelMengmeng Li, Yong Zhao. 146-155 [doi]
- Trusted Virtual Domains - Design, Implementation and Lessons LearnedLuigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan. 156-179 [doi]
- Trusted Integrity Measurement and Reporting for Virtualized PlatformsSerdar Cabuk, Liqun Chen, David Plaquin, Mark Ryan. 180-196 [doi]
- A Feather-Weight Application Isolation ModelJianhua Liao, Yong Zhao, ChangXiang Shen. 197-211 [doi]
- Exploring Trust of Mobile Applications Based on User BehaviorsZheng Yan, Yan Dong, Valtteri Niemi, Guoliang Yu. 212-226 [doi]
- Trusted Firmware Services Based on TPMZhenlong Du, Xiaoli Li, Kangkang Shen. 227-235 [doi]
- Improved Cryptanalysis of the FOX Block CipherZhongming Wu, Yiyuan Luo, Xuejia Lai, Bo Zhu. 236-249 [doi]
- Bitwise Higher Order Differential CryptanalysisBo Zhu, Kefei Chen, Xuejia Lai. 250-262 [doi]