Skip to main content
  • Conference proceedings
  • © 2012

Trusted Systems

4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7711)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): INTRUST: International Conference on Trusted Systems

Conference proceedings info: INTRUST 2012.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (10 papers)

  1. Front Matter

  2. Session 1: Automated Analysis

  3. Session 2: Security and Trust

    1. Stamp and Extend – Instant But Undeniable Timestamping Based on Lazy Trees

      • Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski
      Pages 5-24
    2. Establishing Trust between Nodes in Mobile Ad-Hoc Networks

      • Nicolai Kuntze, Carsten Rudolph, Janne Paatero
      Pages 48-62
  4. Session 4: Security of Distributed Systems

    1. Security in the Distributed Internet of Things

      • Rodrigo Roman, Javier Lopez
      Pages 65-66
  5. Session 5: Evaluation and Analysis

    1. A Multi-criteria-Based Evaluation of Android Applications

      • Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra
      Pages 67-82
    2. Security Analysis of an Open Car Immobilizer Protocol Stack

      • Stefan Tillich, Marcin Wójcik
      Pages 83-94
    3. A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes

      • Ernie Brickell, Liqun Chen, Jiangtao Li
      Pages 95-111
  6. Session 6: Embedded Security

    1. The Yin and Yang Sides of Embedded Security

      • Christof Paar
      Pages 112-115
  7. Back Matter

Other Volumes

  1. Trusted Systems

About this book

This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security.

Editors and Affiliations

  • Information Security Group, University of London, Egham, UK

    Chris J. Mitchell, Allan Tomlinson

Bibliographic Information

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access