Skip to main content
  • Conference proceedings
  • © 2011

Trusted Systems

Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers

  • Unique visibility
  • State- of-the- art research
  • Fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6802)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): INTRUST: International Conference on Trusted Systems

Conference proceedings info: INTRUST 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 papers)

  1. Front Matter

  2. Implementation Technology

    1. Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks

      • Andreas Reiter, Georg Neubauer, Michael Kapfenberger, Johannes Winter, Kurt Dietrich
      Pages 1-25
    2. Design and Implementation of Document Access Control Model Based on Role and Security Policy

      • Liangjian Mao, Shuzhen Yao, Kai Zhang, Kouichi Sakurai
      Pages 26-36
    3. Towards High-Performance IPsec on Cavium OCTEON Platform

      • Jinli Meng, Xinming Chen, Zhen Chen, Chuang Lin, Beipeng Mu, Lingyun Ruan
      Pages 37-46
  3. Security Analysis

    1. An Abstract Model of a Trusted Platform

      • Cornelius Namiluko, Andrew Martin
      Pages 47-66
    2. Modeling TCG-Based Secure Systems with Colored Petri Nets

      • Liang Gu, Yao Guo, Yanjiang Yang, Feng Bao, Hong Mei
      Pages 67-86
    3. Information Flow Graph: An Approach to Identifying Covert Storage Channels

      • Xiangmei Song, Shiguang Ju, Changda Wang, Conghua Zhou
      Pages 87-97
  4. Cryptographic Aspects (I)

    1. Revocation of Direct Anonymous Attestation

      • Liqun Chen, Jiangtao Li
      Pages 128-147
  5. Cryptographic Aspects (II)

    1. Leakage Resilient Strong Key-Insulated Signatures in Public Channel

      • Le Trieu Phong, Shin’ichiro Matsuo, Moti Yung
      Pages 160-172
    2. Two-Head Dragon Protocol: Preventing Cloning of Signature Keys

      • PrzemysÅ‚aw BÅ‚aÅ›kiewicz, PrzemysÅ‚aw Kubiak, MirosÅ‚aw KutyÅ‚owski
      Pages 173-188
  6. Mobile Trusted Systems

    1. Can Hand-Held Computers Still Be Better Smart Cards?

      • Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan, Tuomas Aura
      Pages 200-218
    2. TruWalletM: Secure Web Authentication on Mobile Platforms

      • Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy
      Pages 219-236
  7. Hardware Security

    1. Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

      • Jean-François Gallais, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni et al.
      Pages 253-270
    2. An Emerging Threat: Eve Meets a Robot

      • Kahraman D. Akdemir, Deniz Karakoyunlu, Taskin Padir, Berk Sunar
      Pages 271-289
  8. Attestation

    1. On Leveraging Stochastic Models for Remote Attestation

      • Tamleek Ali, Mohammad Nauman, Xinwen Zhang
      Pages 290-301

Other Volumes

  1. Trusted Systems

About this book

This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Editors and Affiliations

  • Hewlett-Packard Labs, Bristol, UK

    Liqun Chen

  • Google Inc. and Department of Computer Science, Columbia University, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access