Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings /
This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully...
| Corporate Author: | |
|---|---|
| Other Authors: | , |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2012.
|
| Series: | Lecture Notes in Computer Science,
7711 |
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Automatic Analysis of Security Properties of the TPM
- Stamp and Extend – Instant But Undeniable Timestamping Based on Lazy Trees
- Secure Implementation of Asynchronous Method Calls and Futures
- Establishing Trust between Nodes in Mobile Ad-Hoc Networks
- Panel Discussion: Mobile Device Trust — How Do We Link Social Needs, Technical Requirements, Techniques and Standards?
- Security in the Distributed Internet of Things
- A Multi-criteria-Based Evaluation of Android Applications
- Security Analysis of an Open Car Immobilizer Protocol Stack
- A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes
- The Yin and Yang Sides of Embedded Security.