Skip to main content
  • Conference proceedings
  • © 2016

Trusted Systems

7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9565)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): INTRUST: International Conference on Trusted Systems

Conference proceedings info: INTRUST 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (15 papers)

  1. Front Matter

    Pages I-XII
  2. Encryptions and Signatures

    1. Front Matter

      Pages 1-1
    2. Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks

      • Huishan Bian, Liehuang Zhu, Meng Shen, Mingzhong Wang, Chang Xu, Qiongyu Zhang
      Pages 3-16
    3. Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs

      • Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto
      Pages 32-48
    4. Public Key Encryption with Distributed Keyword Search

      • Veronika Kuchta, Mark Manulis
      Pages 62-83
  3. Security Model

    1. Front Matter

      Pages 97-97
    2. Attribute-Based Signatures with Controllable Linkability

      • Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen
      Pages 114-129
  4. Trusted Technologies

    1. Front Matter

      Pages 151-151
    2. An Application-Oriented Efficient Encapsulation System for Trusted Software Development

      • Zheng Tao, Jun Hu, Jing Zhan, Mo Li, Chunzi Chen
      Pages 153-168
  5. Software and System Security

    1. Front Matter

      Pages 201-201
    2. Application of NTRU Using Group Rings to Partial Decryption Technique

      • Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai
      Pages 203-213
    3. An Audit Log Protection Mechanism Based on Security Chip

      • Guan Wang, Ziyi Wang, Jian Sun, Jun Zhou
      Pages 226-233

Other Volumes

  1. Trusted Systems

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015.

The revised 12 full papers presented have been carefully reviewed and selected from 29 submissions. They are devoted to all aspects of trusted computing systems, including trusted modules, platforms; networks, services and applications. The papers are organized in the following sections: encryptions and signatures; security model; trusted technologies; software and system security.

Editors and Affiliations

  • Computer Science, Columbia University, New York, USA

    Moti Yung

  • Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China

    Jianbiao Zhang, Zhen Yang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access