International Conference on Trusted Systems最新文献

筛选
英文 中文
Computationally Sound Symbolic Analysis of EAP-TNC Protocol EAP-TNC协议的计算健全符号分析
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_8
Zijian Zhang, Liehuang Zhu, Feng Wang, L. Liao, Cong Guo, Hongyuan Wang
{"title":"Computationally Sound Symbolic Analysis of EAP-TNC Protocol","authors":"Zijian Zhang, Liehuang Zhu, Feng Wang, L. Liao, Cong Guo, Hongyuan Wang","doi":"10.1007/978-3-642-32298-3_8","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_8","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116946935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building General Purpose Security Services on Trusted Computing 基于可信计算构建通用安全服务
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_2
Chunhua Chen, C. Mitchell, Shaohua Tang
{"title":"Building General Purpose Security Services on Trusted Computing","authors":"Chunhua Chen, C. Mitchell, Shaohua Tang","doi":"10.1007/978-3-642-32298-3_2","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_2","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129862771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks 基于成本的拒绝服务攻击分析框架的改进
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_6
Q. Yue, Feng Liu, Rui Xue
{"title":"Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks","authors":"Q. Yue, Feng Liu, Rui Xue","doi":"10.1007/978-3-642-32298-3_6","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_6","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117049966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mass Transit Ticketing with NFC Mobile Phones 使用NFC手机进行地铁票务
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_4
Jan-Erik Ekberg, Sandeep Tamrakar
{"title":"Mass Transit Ticketing with NFC Mobile Phones","authors":"Jan-Erik Ekberg, Sandeep Tamrakar","doi":"10.1007/978-3-642-32298-3_4","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_4","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126887113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
DAA Protocol Analysis and Verification DAA协议分析与验证
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_21
Yu Qin, XiaoBo Chu, D. Feng, Wei Feng
{"title":"DAA Protocol Analysis and Verification","authors":"Yu Qin, XiaoBo Chu, D. Feng, Wei Feng","doi":"10.1007/978-3-642-32298-3_21","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_21","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131643392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enforcing Sticky Policies with TPM and Virtualization 通过TPM和虚拟化实施粘性策略
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_3
Gina Kounga, Liqun Chen
{"title":"Enforcing Sticky Policies with TPM and Virtualization","authors":"Gina Kounga, Liqun Chen","doi":"10.1007/978-3-642-32298-3_3","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_3","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131763176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Technique for Remote Detection of Certain Virtual Machine Monitors 一种远程检测某些虚拟机监视器的技术
International Conference on Trusted Systems Pub Date : 2011-11-27 DOI: 10.1007/978-3-642-32298-3_9
Christopher Jämthagen, Martin Hell, B. Smeets
{"title":"A Technique for Remote Detection of Certain Virtual Machine Monitors","authors":"Christopher Jämthagen, Martin Hell, B. Smeets","doi":"10.1007/978-3-642-32298-3_9","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_9","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131865557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A General, Flexible and Efficient Proof of Inclusion and Exclusion 一种通用、灵活和有效的包含和排除证明
International Conference on Trusted Systems Pub Date : 2011-02-14 DOI: 10.1007/978-3-642-32298-3_12
Kun Peng
{"title":"A General, Flexible and Efficient Proof of Inclusion and Exclusion","authors":"Kun Peng","doi":"10.1007/978-3-642-32298-3_12","DOIUrl":"https://doi.org/10.1007/978-3-642-32298-3_12","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"44 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Measuring Random Tests by Conditional Entropy and Optimal Execution Order 基于条件熵和最优执行顺序的随机测试度量
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_10
Jialin Huang, Xuejia Lai
{"title":"Measuring Random Tests by Conditional Entropy and Optimal Execution Order","authors":"Jialin Huang, Xuejia Lai","doi":"10.1007/978-3-642-25283-9_10","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_10","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116135760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress 双头龙协议:防止克隆签名密钥-工作正在进行中
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_12
Przemyslaw Blaskiewicz, Przemyslaw Kubiak, Mirosław Kutyłowski
{"title":"Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress","authors":"Przemyslaw Blaskiewicz, Przemyslaw Kubiak, Mirosław Kutyłowski","doi":"10.1007/978-3-642-25283-9_12","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_12","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124101866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信