International Conference on Trusted Systems最新文献

筛选
英文 中文
On Leveraging Stochastic Models for Remote Attestation 利用随机模型进行远程认证
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_19
T. Ali, M. Nauman, Xinwen Zhang
{"title":"On Leveraging Stochastic Models for Remote Attestation","authors":"T. Ali, M. Nauman, Xinwen Zhang","doi":"10.1007/978-3-642-25283-9_19","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_19","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134552073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Can Hand-Held Computers Still Be Better Smart Cards? 手持电脑仍然是更好的智能卡吗?
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_14
Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan, T. Aura
{"title":"Can Hand-Held Computers Still Be Better Smart Cards?","authors":"Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan, T. Aura","doi":"10.1007/978-3-642-25283-9_14","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_14","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126073842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Reputation Computing Model - (Work-in-Progress) 一种新的声誉计算模型-(正在研究中)
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_21
Yongzhong Zhang, Qi Li, Zhangxi Lin
{"title":"A Novel Reputation Computing Model - (Work-in-Progress)","authors":"Yongzhong Zhang, Qi Li, Zhangxi Lin","doi":"10.1007/978-3-642-25283-9_21","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_21","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121388371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol 使用DAA-SIGMA协议的匿名认证密钥交换
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_8
Jesse Walker, Jiangtao Li
{"title":"Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol","authors":"Jesse Walker, Jiangtao Li","doi":"10.1007/978-3-642-25283-9_8","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_8","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121814940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress) 基于博弈论的manet内部可疑人员监控机制(工作中)
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_16
D. Hao, Yizhi Ren, K. Sakurai
{"title":"A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress)","authors":"D. Hao, Yizhi Ren, K. Sakurai","doi":"10.1007/978-3-642-25283-9_16","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_16","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114353209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling TCG-Based Secure Systems with Colored Petri Nets 基于彩色Petri网的tcg安全系统建模
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_5
Liang Gu, Yao Guo, Yanjiang Yang, F. Bao, Hong Mei
{"title":"Modeling TCG-Based Secure Systems with Colored Petri Nets","authors":"Liang Gu, Yao Guo, Yanjiang Yang, F. Bao, Hong Mei","doi":"10.1007/978-3-642-25283-9_5","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_5","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129217826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards High-Performance IPsec on Cavium OCTEON Platform 面向OCTEON平台的高性能IPsec
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_3
J. Meng, Xinming Chen, Zhen Chen, Chuang Lin, Beipeng Mu, Lingyun Ruan
{"title":"Towards High-Performance IPsec on Cavium OCTEON Platform","authors":"J. Meng, Xinming Chen, Zhen Chen, Chuang Lin, Beipeng Mu, Lingyun Ruan","doi":"10.1007/978-3-642-25283-9_3","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_3","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121109250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software 诱导或放大加密软件侧信道泄漏的硬件木马
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_17
Jean-François Gallais, J. Großschädl, Neil Hanley, Markus Kasper, M. Medwed, F. Regazzoni, Jörn-Marc Schmidt, S. Tillich, M. Wójcik
{"title":"Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software","authors":"Jean-François Gallais, J. Großschädl, Neil Hanley, Markus Kasper, M. Medwed, F. Regazzoni, Jörn-Marc Schmidt, S. Tillich, M. Wójcik","doi":"10.1007/978-3-642-25283-9_17","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_17","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116026416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks 可信计算与标准加密框架的无缝集成
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_1
Andreas Reiter, Georg Neubauer, Michael Kapfenberger, Johannes Winter, Kurt Dietrich
{"title":"Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks","authors":"Andreas Reiter, Georg Neubauer, Michael Kapfenberger, Johannes Winter, Kurt Dietrich","doi":"10.1007/978-3-642-25283-9_1","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_1","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120839049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Leakage Resilient Strong Key-Insulated Signatures in Public Channel 公共通道中防泄漏强密钥绝缘签名
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_11
L. T. Phong, Shin'ichiro Matsuo, M. Yung
{"title":"Leakage Resilient Strong Key-Insulated Signatures in Public Channel","authors":"L. T. Phong, Shin'ichiro Matsuo, M. Yung","doi":"10.1007/978-3-642-25283-9_11","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_11","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信