{"title":"Security Analysis of an Open Car Immobilizer Protocol Stack","authors":"S. Tillich, M. Wójcik","doi":"10.1007/978-3-642-35371-0_8","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_8","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132676551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security in the Distributed Internet of Things","authors":"R. Román, Javier López","doi":"10.1007/978-3-642-35371-0_6","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_6","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121749953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Establishing Trust between Nodes in Mobile Ad-Hoc Networks","authors":"N. Kuntze, C. Rudolph, J. Paatero","doi":"10.1007/978-3-642-35371-0_4","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_4","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"59 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126731502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards?","authors":"Shin'ichiro Matsuo","doi":"10.1007/978-3-642-35371-0_5","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_5","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123779473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Dini, F. Martinelli, I. Matteucci, M. Petrocchi, A. Saracino, D. Sgandurra
{"title":"A Multi-criteria-Based Evaluation of Android Applications","authors":"G. Dini, F. Martinelli, I. Matteucci, M. Petrocchi, A. Saracino, D. Sgandurra","doi":"10.1007/978-3-642-35371-0_7","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_7","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131600424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Yin and Yang Sides of Embedded Security","authors":"C. Paar","doi":"10.1007/978-3-642-35371-0_10","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_10","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129730216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multifactor Authenticated Key Renewal","authors":"Shin'ichiro Matsuo, D. Moriyama, M. Yung","doi":"10.1007/978-3-642-32298-3_14","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_14","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"417 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124183873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks","authors":"D. Hao, A. Adhikari, K. Sakurai","doi":"10.1007/978-3-642-32298-3_16","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_16","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123898131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, Xiaohu Huang
{"title":"Fault Detection of the MacGuffin Cipher against Differential Fault Attack","authors":"Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, Xiaohu Huang","doi":"10.1007/978-3-642-32298-3_7","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_7","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"418 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123050354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}