Trusted Systems

Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers

  • Liqun Chen
  • Moti Yung
Conference proceedings INTRUST 2010

DOI: 10.1007/978-3-642-25283-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6802)

Table of contents

  1. Front Matter
  2. Implementation Technology

    1. Andreas Reiter, Georg Neubauer, Michael Kapfenberger, Johannes Winter, Kurt Dietrich
      Pages 1-25
    2. Liangjian Mao, Shuzhen Yao, Kai Zhang, Kouichi Sakurai
      Pages 26-36
    3. Jinli Meng, Xinming Chen, Zhen Chen, Chuang Lin, Beipeng Mu, Lingyun Ruan
      Pages 37-46
  3. Security Analysis

    1. Cornelius Namiluko, Andrew Martin
      Pages 47-66
    2. Liang Gu, Yao Guo, Yanjiang Yang, Feng Bao, Hong Mei
      Pages 67-86
    3. Xiangmei Song, Shiguang Ju, Changda Wang, Conghua Zhou
      Pages 87-97
  4. Cryptographic Aspects (I)

  5. Cryptographic Aspects (II)

    1. Le Trieu Phong, Shin’ichiro Matsuo, Moti Yung
      Pages 160-172
    2. Przemysław Błaśkiewicz, Przemysław Kubiak, Mirosław Kutyłowski
      Pages 173-188
  6. Mobile Trusted Systems

    1. Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan, Tuomas Aura
      Pages 200-218
    2. Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy
      Pages 219-236
  7. Hardware Security

    1. Jean-François Gallais, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni et al.
      Pages 253-270
    2. Kahraman D. Akdemir, Deniz Karakoyunlu, Taskin Padir, Berk Sunar
      Pages 271-289
  8. Attestation

    1. Tamleek Ali, Mohammad Nauman, Xinwen Zhang
      Pages 290-301

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2010, held in Beijing, China, in December 2010.
The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Keywords

document protection network security risk assessment surveillance virtual private networks

Editors and affiliations

  • Liqun Chen
    • 1
  • Moti Yung
    • 2
  1. 1.Hewlett-Packard LabsBristolUK
  2. 2.Google Inc. and Department of Computer ScienceColumbia UniversityUSA

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-25282-2
  • Online ISBN 978-3-642-25283-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349