Abstract is missing.
- Seamless Integration of Trusted Computing into Standard Cryptographic FrameworksAndreas Reiter, Georg Neubauer, Michael Kapfenberger, Johannes Winter, Kurt Dietrich. 1-25 [doi]
- Design and Implementation of Document Access Control Model Based on Role and Security PolicyLiangjian Mao, Shuzhen Yao, Kai Zhang, Kouichi Sakurai. 26-36 [doi]
- Towards High-Performance IPsec on Cavium OCTEON PlatformJinli Meng, Xinming Chen, Zhen Chen, Chuang Lin, Beipeng Mu, Lingyun Ruan. 37-46 [doi]
- An Abstract Model of a Trusted PlatformCornelius Namiluko, Andrew Martin. 47-66 [doi]
- Modeling TCG-Based Secure Systems with Colored Petri NetsLiang Gu, Yao Guo, Yanjiang Yang, Feng Bao, Hong Mei. 67-86 [doi]
- Information Flow Graph: An Approach to Identifying Covert Storage ChannelsXiangmei Song, Shiguang Ju, Chang-da Wang, Conghua Zhou. 87-97 [doi]
- Trusted Subjects Configuration Based on TE Model in MLS SystemsShangjie Li, Yeping He. 98-107 [doi]
- Key Exchange with Anonymous Authentication Using DAA-SIGMA ProtocolJesse Walker, Jiangtao Li 0001. 108-127 [doi]
- Revocation of Direct Anonymous AttestationLiqun Chen, Jiangtao Li 0001. 128-147 [doi]
- Measuring Random Tests by Conditional Entropy and Optimal Execution OrderJialin Huang, Xuejia Lai. 148-159 [doi]
- Leakage Resilient Strong Key-Insulated Signatures in Public ChannelLe Trieu Phong, Shin'ichiro Matsuo, Moti Yung. 160-172 [doi]
- Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in ProgressPrzemyslaw Blaskiewicz, Przemyslaw Kubiak, Miroslaw Kutylowski. 173-188 [doi]
- Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted ComputingYanjiang Yang, Liang Gu, Feng Bao. 189-199 [doi]
- Can Hand-Held Computers Still Be Better Smart Cards?Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan, Tuomas Aura. 200-218 [doi]
- TruWalletM: Secure Web Authentication on Mobile PlatformsSven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy. 219-236 [doi]
- A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress)Dong Hao, Yizhi Ren, Kouichi Sakurai. 237-252 [doi]
- Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic SoftwareJean-François Gallais, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni, Jörn-Marc Schmidt, Stefan Tillich, Marcin Wójcik. 253-270 [doi]
- An Emerging Threat: Eve Meets a Robot - (Work-in-Progress)Kahraman D. Akdemir, Deniz Karakoyunlu, Taskin Padir, Berk Sunar. 271-289 [doi]
- On Leveraging Stochastic Models for Remote AttestationTamleek Ali, Mohammad Nauman, Xinwen Zhang. 290-301 [doi]
- Interoperable Remote Attestation for VPN Environments - (Work in Progress)Ingo Bente, Bastian Hellmann, Joerg Vieweg, Josef von Helden, Arne Welzel. 302-315 [doi]
- A Novel Reputation Computing Model - (Work-in-Progress)Yongzhong Zhang, Qi Li, Zhangxi Lin. 316-325 [doi]
- acTvSM: A Dynamic Virtualization Platform for Enforcement of Application IntegrityRonald Toegl, Martin Pirker, Michael Gissing. 326-345 [doi]
- Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure SoftwareCraig S. Wright. 346-360 [doi]