International Conference on Trusted Systems最新文献

筛选
英文 中文
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes 几种直接匿名认证方案的静态Diffie-Hellman攻击
International Conference on Trusted Systems Pub Date : 2012-12-17 DOI: 10.1007/978-3-642-35371-0_9
Ernie Brickell, Liqun Chen, Jiangtao Li
{"title":"A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes","authors":"Ernie Brickell, Liqun Chen, Jiangtao Li","doi":"10.1007/978-3-642-35371-0_9","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_9","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121749928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Analysis of an Open Car Immobilizer Protocol Stack 一种开放式汽车防盗协议栈的安全性分析
International Conference on Trusted Systems Pub Date : 2012-12-17 DOI: 10.1007/978-3-642-35371-0_8
S. Tillich, M. Wójcik
{"title":"Security Analysis of an Open Car Immobilizer Protocol Stack","authors":"S. Tillich, M. Wójcik","doi":"10.1007/978-3-642-35371-0_8","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_8","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132676551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Security in the Distributed Internet of Things 分布式物联网中的安全
International Conference on Trusted Systems Pub Date : 2012-12-17 DOI: 10.1007/978-3-642-35371-0_6
R. Román, Javier López
{"title":"Security in the Distributed Internet of Things","authors":"R. Román, Javier López","doi":"10.1007/978-3-642-35371-0_6","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_6","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121749953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Establishing Trust between Nodes in Mobile Ad-Hoc Networks 移动Ad-Hoc网络中节点间信任的建立
International Conference on Trusted Systems Pub Date : 2012-12-17 DOI: 10.1007/978-3-642-35371-0_4
N. Kuntze, C. Rudolph, J. Paatero
{"title":"Establishing Trust between Nodes in Mobile Ad-Hoc Networks","authors":"N. Kuntze, C. Rudolph, J. Paatero","doi":"10.1007/978-3-642-35371-0_4","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_4","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"59 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126731502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards? 小组讨论:移动设备信任——我们如何将社会需求、技术要求、技术和标准联系起来?
International Conference on Trusted Systems Pub Date : 2012-12-17 DOI: 10.1007/978-3-642-35371-0_5
Shin'ichiro Matsuo
{"title":"Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards?","authors":"Shin'ichiro Matsuo","doi":"10.1007/978-3-642-35371-0_5","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_5","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123779473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-criteria-Based Evaluation of Android Applications 基于多标准的Android应用评估
International Conference on Trusted Systems Pub Date : 2012-12-17 DOI: 10.1007/978-3-642-35371-0_7
G. Dini, F. Martinelli, I. Matteucci, M. Petrocchi, A. Saracino, D. Sgandurra
{"title":"A Multi-criteria-Based Evaluation of Android Applications","authors":"G. Dini, F. Martinelli, I. Matteucci, M. Petrocchi, A. Saracino, D. Sgandurra","doi":"10.1007/978-3-642-35371-0_7","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_7","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131600424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
The Yin and Yang Sides of Embedded Security 嵌入式安全的阴阳两面
International Conference on Trusted Systems Pub Date : 2011-12-11 DOI: 10.1007/978-3-642-35371-0_10
C. Paar
{"title":"The Yin and Yang Sides of Embedded Security","authors":"C. Paar","doi":"10.1007/978-3-642-35371-0_10","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_10","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129730216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multifactor Authenticated Key Renewal 多因素认证密钥更新
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_14
Shin'ichiro Matsuo, D. Moriyama, M. Yung
{"title":"Multifactor Authenticated Key Renewal","authors":"Shin'ichiro Matsuo, D. Moriyama, M. Yung","doi":"10.1007/978-3-642-32298-3_14","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_14","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"417 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124183873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks 基于混合策略博弈的集群无线传感器网络信任管理
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_16
D. Hao, A. Adhikari, K. Sakurai
{"title":"Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks","authors":"D. Hao, A. Adhikari, K. Sakurai","doi":"10.1007/978-3-642-32298-3_16","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_16","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123898131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fault Detection of the MacGuffin Cipher against Differential Fault Attack 针对差分故障攻击的MacGuffin密码故障检测
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_7
Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, Xiaohu Huang
{"title":"Fault Detection of the MacGuffin Cipher against Differential Fault Attack","authors":"Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, Xiaohu Huang","doi":"10.1007/978-3-642-32298-3_7","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_7","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"418 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123050354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信