Trusted systems : first international conference, INTRUST 2009, Beijing, China, December 17-19, 2009 : revised selected papers / Liqun Chen, Moti Yung (Eds.).
Material type:
TextSeries: Lecture notes in computer science ; 6163. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; Heidelberg : Springer-Verlag, ©2010.Description: 1 online resource (xiv, 262 pages) : color portraitsContent type: - text
- computer
- online resource
- 9783642145971
- 3642145973
- INTRUST 2009
- Computer security -- Congresses
- Computer networks -- Security measures -- Congresses
- Computer networks
- Computer security
- Computer Communication Networks
- Computer Security
- Sécurité informatique -- Congrès
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Réseaux d'ordinateurs
- Sécurité informatique
- Informatique
- Computer networks
- Computer networks -- Security measures
- Computer security
- 005.8 22
- QA76.9.A25 I58 2010
- QA 76.9.A25
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes bibliographical references and index.
Invited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage -- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing -- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks -- Attestation -- Remote Attestation on Function Execution (Work-in-Progress) -- Scalable Remote Attestation with Privacy Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network -- SocialClouds: Concept, Security Architecture and Some Mechanisms -- Privacy Enhanced Trusted Network Connect -- Research on Multistage Interconnection Architecture and Collision Detection Model -- Virtualization -- Trusted Virtual Domains -- Design, Implementation and Lessons Learned -- Trusted Integrity Measurement and Reporting for Virtualized Platforms -- Applications -- A Feather-Weight Application Isolation Model -- Exploring Trust of Mobile Applications Based on User Behaviors -- Trusted Firmware Services Based on TPM -- Supporting Technology -- Improved Cryptanalysis of the FOX Block Cipher -- Bitwise Higher Order Differential Cryptanalysis.
This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2009.