Trusted Systems

4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings

Editors:

ISBN: 978-3-642-35370-3 (Print) 978-3-642-35371-0 (Online)

Table of contents (10 chapters)

  1. Front Matter

    Pages -

  2. Session 1: Automated Analysis

    1. No Access

      Book Chapter

      Pages 1-4

      Automatic Analysis of Security Properties of the TPM

  3. Session 2: Security and Trust

    1. No Access

      Book Chapter

      Pages 5-24

      Stamp and Extend – Instant But Undeniable Timestamping Based on Lazy Trees

    2. No Access

      Book Chapter

      Pages 25-47

      Secure Implementation of Asynchronous Method Calls and Futures

    3. No Access

      Book Chapter

      Pages 48-62

      Establishing Trust between Nodes in Mobile Ad-Hoc Networks

  4. Session 3: Mobile Trust

    1. No Access

      Book Chapter

      Pages 63-64

      Panel Discussion: Mobile Device Trust — How Do We Link Social Needs, Technical Requirements, Techniques and Standards?

  5. Session 4: Security of Distributed Systems

    1. No Access

      Book Chapter

      Pages 65-66

      Security in the Distributed Internet of Things

  6. Session 5: Evaluation and Analysis

    1. No Access

      Book Chapter

      Pages 67-82

      A Multi-criteria-Based Evaluation of Android Applications

    2. No Access

      Book Chapter

      Pages 83-94

      Security Analysis of an Open Car Immobilizer Protocol Stack

    3. No Access

      Book Chapter

      Pages 95-111

      A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes

  7. Session 6: Embedded Security

    1. No Access

      Book Chapter

      Pages 112-115

      The Yin and Yang Sides of Embedded Security

  8. Back Matter

    Pages -