Przemyslaw Blaskiewicz, M. Klonowski, Mirosław Kutyłowski, P. Syga
{"title":"Lightweight Protocol for Trusted Spontaneous Communication","authors":"Przemyslaw Blaskiewicz, M. Klonowski, Mirosław Kutyłowski, P. Syga","doi":"10.1007/978-3-319-27998-5_15","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_15","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133367786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Weiß, Benjamin Weggenmann, Moritz August, G. Sigl
{"title":"On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems","authors":"Michael Weiß, Benjamin Weggenmann, Moritz August, G. Sigl","doi":"10.1007/978-3-319-27998-5_10","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_10","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"15 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116763798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simulated Annealing Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors","authors":"Dan Ding, Guizhen Zhu","doi":"10.1007/978-3-319-27998-5_4","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_4","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122381676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"APP Vetting Based on the Consistency of Description and APK","authors":"Weili Han, Wei Wang, Xinyi Zhang, Weiwei Peng, Zheran Fang","doi":"10.1007/978-3-319-27998-5_17","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_17","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"34 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114033820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang
{"title":"A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases","authors":"Yun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang","doi":"10.1007/978-3-319-27998-5_24","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_24","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131206941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust","authors":"Anbang Ruan, Andrew P. Martin","doi":"10.1007/978-3-319-27998-5_12","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_12","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134575532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}