Skip to main content
  • Conference proceedings
  • © 2015

Trusted Systems

6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9473)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): INTRUST: International Conference on Trusted Systems

Conference proceedings info: INTRUST 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

    Pages I-XIII
  2. Identity-Embedding Method for Decentralized Public-Key Infrastructure

    • Hiroaki Anada, Junpei Kawamoto, Jian Weng, Kouichi Sakurai
    Pages 1-14
  3. Diversification of System Calls in Linux Binaries

    • Sampsa Rauti, Samuel Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, Sami Hyrynsalmi, Ville Leppänen
    Pages 15-35
  4. Outsourced KP-ABE with Enhanced Security

    • Chao Li, Bo Lang, Jinmiao Wang
    Pages 36-50
  5. Rerandomizable Threshold Blind Signatures

    • Veronika Kuchta, Mark Manulis
    Pages 70-89
  6. Verifiable Computation of Large Polynomials

    • Jiaqi Hong, Haixia Xu, Peili Li
    Pages 90-104
  7. A Characterization of Cybersecurity Posture from Network Telescope Data

    • Zhenxin Zhan, Maochao Xu, Shouhuai Xu
    Pages 105-126
  8. Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage

    • Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia
    Pages 127-136
  9. Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set

    • JingFeng Xue, Yan Zhang, ChangZhen Hu, HongYu Ren, ZhiQiang Li
    Pages 137-150
  10. On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems

    • Michael Weiß, Benjamin Weggenmann, Moritz August, Georg Sigl
    Pages 151-167
  11. How to Choose Interesting Points for Template Attacks More Effectively?

    • Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
    Pages 168-183
  12. NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust

    • Anbang Ruan, Andrew Martin
    Pages 184-200
  13. A Privacy-Aware Access Model on Anonymized Data

    • Xuezhen Huang, Jiqiang Liu, Zhen Han
    Pages 201-212
  14. Functional Signatures from Indistinguishability Obfuscation

    • Li Wang, Hongda Li, Fei Tang
    Pages 213-227
  15. Lightweight Protocol for Trusted Spontaneous Communication

    • PrzemysÅ‚aw BÅ‚aÅ›kiewicz, Marek Klonowski, MirosÅ‚aw KutyÅ‚owski, Piotr Syga
    Pages 228-242
  16. Using TPM Secure Storage in Trusted High Availability Systems

    • Martin Hell, Linus Karlsson, Ben Smeets, Jelena Mirosavljevic
    Pages 243-258
  17. APP Vetting Based on the Consistency of Description and APK

    • Weili Han, Wei Wang, Xinyi Zhang, Weiwei Peng, Zheran Fang
    Pages 259-277
  18. Traitor Tracing Based on Partially-Ordered Hierarchical Encryption

    • Yan Zhu, Dandan Li, Liguang Yang
    Pages 278-293

Other Volumes

  1. Trusted Systems

About this book

Normal 0 false false false EN-US X-NONE X-NONE

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014.

The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.

 

 

/* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}

Editors and Affiliations

  • Google, New York, USA

    Moti Yung

  • Beijing Institute of Technology, Beijing, China

    Liehuang Zhu

  • Institute for Infocomm Research, Singapore

    Yanjiang Yang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access