David Derler, Klaus Potzmader, Johannes Winter, Kurt Dietrich
{"title":"Anonymous Ticketing for NFC-Enabled Mobile Phones","authors":"David Derler, Klaus Potzmader, Johannes Winter, Kurt Dietrich","doi":"10.1007/978-3-642-32298-3_5","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_5","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123139042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hash Chains at the Basis of a Secure Reactive Routing Protocol","authors":"T. Bouabana-Tebibel","doi":"10.1007/978-3-642-32298-3_17","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_17","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126438287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Gligoroski, R. S. Ødegård, R. Jensen, Ludovic Perret, J. Faugère, S. J. Knapskog, S. Markovski
{"title":"MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme","authors":"D. Gligoroski, R. S. Ødegård, R. Jensen, Ludovic Perret, J. Faugère, S. J. Knapskog, S. Markovski","doi":"10.1007/978-3-642-32298-3_13","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_13","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, C. Vishik, M. Wójcik
{"title":"Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM","authors":"Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, C. Vishik, M. Wójcik","doi":"10.1007/978-3-642-32298-3_18","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_18","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132578203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Johannes Winter, Paul Wiegele, Martin Pirker, Ronald Toegl
{"title":"A Flexible Software Development and Emulation Framework for ARM TrustZone","authors":"Johannes Winter, Paul Wiegele, Martin Pirker, Ronald Toegl","doi":"10.1007/978-3-642-32298-3_1","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_1","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mirosław Kutyłowski, L. Krzywiecki, Przemyslaw Kubiak, Michal Koza
{"title":"Restricted Identification Scheme and Diffie-Hellman Linking Problem","authors":"Mirosław Kutyłowski, L. Krzywiecki, Przemyslaw Kubiak, Michal Koza","doi":"10.1007/978-3-642-32298-3_15","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_15","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}