International Conference on Trusted Systems最新文献

筛选
英文 中文
A Performance Analysis of Identity-Based Encryption Schemes 基于身份的加密方案的性能分析
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_19
Pengqi Cheng, Yan Gu, Zihong Lv, Jianfei Wang, Wenlei Zhu, Zhen Chen, Jiwei Huang
{"title":"A Performance Analysis of Identity-Based Encryption Schemes","authors":"Pengqi Cheng, Yan Gu, Zihong Lv, Jianfei Wang, Wenlei Zhu, Zhen Chen, Jiwei Huang","doi":"10.1007/978-3-642-32298-3_19","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_19","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131285214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Anonymous Ticketing for NFC-Enabled Mobile Phones 支持nfc的移动电话匿名票务
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_5
David Derler, Klaus Potzmader, Johannes Winter, Kurt Dietrich
{"title":"Anonymous Ticketing for NFC-Enabled Mobile Phones","authors":"David Derler, Klaus Potzmader, Johannes Winter, Kurt Dietrich","doi":"10.1007/978-3-642-32298-3_5","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_5","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123139042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Hash Chains at the Basis of a Secure Reactive Routing Protocol 基于安全响应式路由协议的哈希链
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_17
T. Bouabana-Tebibel
{"title":"Hash Chains at the Basis of a Secure Reactive Routing Protocol","authors":"T. Bouabana-Tebibel","doi":"10.1007/978-3-642-32298-3_17","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_17","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126438287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indifferentiability of Domain Extension Modes for Hash Functions 哈希函数域扩展模式的不可微性
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_10
Yiyuan Luo, Xuejia Lai, Zheng Gong
{"title":"Indifferentiability of Domain Extension Modes for Hash Functions","authors":"Yiyuan Luo, Xuejia Lai, Zheng Gong","doi":"10.1007/978-3-642-32298-3_10","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_10","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multicollisions and Graph-Based Hash Functions 多重冲突和基于图的哈希函数
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_11
Kimmo Halunen
{"title":"Multicollisions and Graph-Based Hash Functions","authors":"Kimmo Halunen","doi":"10.1007/978-3-642-32298-3_11","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_11","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133266245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A (Corrected) DAA Scheme Using Batch Proof and Verification 采用批证明和验证的DAA(修正)方案
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_20
Ernie Brickell, Liqun Chen, Jiangtao Li
{"title":"A (Corrected) DAA Scheme Using Batch Proof and Verification","authors":"Ernie Brickell, Liqun Chen, Jiangtao Li","doi":"10.1007/978-3-642-32298-3_20","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_20","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116342703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme MQQ-SIG——一种超快速且可证明的抗CMA数字签名方案
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_13
D. Gligoroski, R. S. Ødegård, R. Jensen, Ludovic Perret, J. Faugère, S. J. Knapskog, S. Markovski
{"title":"MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme","authors":"D. Gligoroski, R. S. Ødegård, R. Jensen, Ludovic Perret, J. Faugère, S. J. Knapskog, S. Markovski","doi":"10.1007/978-3-642-32298-3_13","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_13","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM 离散0.13um SRAM上PUF器件认证方案的评估
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_18
Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, C. Vishik, M. Wójcik
{"title":"Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM","authors":"Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, C. Vishik, M. Wójcik","doi":"10.1007/978-3-642-32298-3_18","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_18","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132578203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Flexible Software Development and Emulation Framework for ARM TrustZone ARM TrustZone灵活的软件开发与仿真框架
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_1
Johannes Winter, Paul Wiegele, Martin Pirker, Ronald Toegl
{"title":"A Flexible Software Development and Emulation Framework for ARM TrustZone","authors":"Johannes Winter, Paul Wiegele, Martin Pirker, Ronald Toegl","doi":"10.1007/978-3-642-32298-3_1","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_1","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Restricted Identification Scheme and Diffie-Hellman Linking Problem 受限识别方案与Diffie-Hellman连接问题
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_15
Mirosław Kutyłowski, L. Krzywiecki, Przemyslaw Kubiak, Michal Koza
{"title":"Restricted Identification Scheme and Diffie-Hellman Linking Problem","authors":"Mirosław Kutyłowski, L. Krzywiecki, Przemyslaw Kubiak, Michal Koza","doi":"10.1007/978-3-642-32298-3_15","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_15","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信