Skip to main content
  • Conference proceedings
  • © 2012

Trusted Systems

Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers

  • Unique visibility
  • State-of-the-art research
  • Fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7222)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): INTRUST: International Conference on Trusted Systems

Conference proceedings info: INTRUST 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

  2. Trusted Services

    1. A Flexible Software Development and Emulation Framework for ARM TrustZone

      • Johannes Winter, Paul Wiegele, Martin Pirker, Ronald Tögl
      Pages 1-15
    2. Building General Purpose Security Services on Trusted Computing

      • Chunhua Chen, Chris J. Mitchell, Shaohua Tang
      Pages 16-31
    3. Enforcing Sticky Policies with TPM and Virtualization

      • Gina Kounga, Liqun Chen
      Pages 32-47
  3. Mobile Trusted Systems

    1. Mass Transit Ticketing with NFC Mobile Phones

      • Jan-Erik Ekberg, Sandeep Tamrakar
      Pages 48-65
    2. Anonymous Ticketing for NFC-Enabled Mobile Phones

      • David Derler, Klaus Potzmader, Johannes Winter, Kurt Dietrich
      Pages 66-83
  4. Security Analysis

    1. Fault Detection of the MacGuffin Cipher against Differential Fault Attack

      • Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, Xiaohu Huang
      Pages 102-112
    2. Computationally Sound Symbolic Analysis of EAP-TNC Protocol

      • Zijian Zhang, Liehuang Zhu, Feng Wang, Lejian Liao, Cong Guo, Hongyuan Wang
      Pages 113-128
    3. A Technique for Remote Detection of Certain Virtual Machine Monitors

      • Christopher Jämthagen, Martin Hell, Ben Smeets
      Pages 129-137
  5. Cryptographic Aspects

    1. Indifferentiability of Domain Extension Modes for Hash Functions

      • Yiyuan Luo, Xuejia Lai, Zheng Gong
      Pages 138-155
    2. MQQ-SIG

      • Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog et al.
      Pages 184-203
    3. Multifactor Authenticated Key Renewal

      • Shin’ichiro Matsuo, Daisuke Moriyama, Moti Yung
      Pages 204-220
    4. Restricted Identification Scheme and Diffie-Hellman Linking Problem

      • Mirosław Kutyłowski, Łukasz Krzywiecki, Przemysław Kubiak, Michał Koza
      Pages 221-238
  6. Trusted Networks

    1. Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks

      • Dong Hao, Avishek Adhikari, Kouichi Sakurai
      Pages 239-257
    2. Hash Chains at the Basis of a Secure Reactive Routing Protocol

      • Thouraya Bouabana-Tebibel
      Pages 258-270
  7. Implementation

    1. Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM

      • Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik
      Pages 271-288
    2. A Performance Analysis of Identity-Based Encryption Schemes

      • Pengqi Cheng, Yan Gu, Zihong Lv, Jianfei Wang, Wenlei Zhu, Zhen Chen et al.
      Pages 289-303

Other Volumes

  1. Trusted Systems

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.

Editors and Affiliations

  • Hewlett-Packard Laboratories, Stoke Gifford, UK

    Liqun Chen

  • Computer Science Department, Columbia University, New York, USA

    Moti Yung

  • Institute of Technology, Beijing Key Lab of Intelligent Information Technology, Beijing, China

    Liehuang Zhu

About the editors

Fast conference proceedings.- State-of-the-art report.- Up to date results.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access