Trusted Systems

4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings

  • Chris J. Mitchell
  • Allan Tomlinson
Conference proceedings INTRUST 2012

DOI: 10.1007/978-3-642-35371-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7711)

Table of contents (10 papers)

  1. Front Matter
  2. Session 1: Automated Analysis

  3. Session 2: Security and Trust

    1. Stamp and Extend – Instant But Undeniable Timestamping Based on Lazy Trees
      Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski
      Pages 5-24
    2. Establishing Trust between Nodes in Mobile Ad-Hoc Networks
      Nicolai Kuntze, Carsten Rudolph, Janne Paatero
      Pages 48-62
  4. Session 3: Mobile Trust

  5. Session 4: Security of Distributed Systems

    1. Security in the Distributed Internet of Things
      Rodrigo Roman, Javier Lopez
      Pages 65-66
  6. Session 5: Evaluation and Analysis

    1. A Multi-criteria-Based Evaluation of Android Applications
      Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra
      Pages 67-82
    2. Security Analysis of an Open Car Immobilizer Protocol Stack
      Stefan Tillich, Marcin Wójcik
      Pages 83-94
    3. A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes
      Ernie Brickell, Liqun Chen, Jiangtao Li
      Pages 95-111
  7. Session 6: Embedded Security

    1. The Yin and Yang Sides of Embedded Security
      Christof Paar
      Pages 112-115
  8. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security.


embedded security internet of things mobile ad-hoc networks trustworthiness undeniability

Editors and affiliations

  • Chris J. Mitchell
    • 1
  • Allan Tomlinson
    • 1
  1. 1.Information Security GroupUniversity of LondonEghamUK

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-35370-3
  • Online ISBN 978-3-642-35371-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349