Advertisement

Trusted Systems

7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers

  • Moti Yung
  • Jianbiao Zhang
  • Zhen Yang
Conference proceedings INTRUST 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9565)

Also part of the Security and Cryptology book sub series (LNSC, volume 9565)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Encryptions and Signatures

    1. Front Matter
      Pages 1-1
    2. Huishan Bian, Liehuang Zhu, Meng Shen, Mingzhong Wang, Chang Xu, Qiongyu Zhang
      Pages 3-16
    3. Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto
      Pages 32-48
    4. Veronika Kuchta, Mark Manulis
      Pages 62-83
  3. Security Model

    1. Front Matter
      Pages 97-97
    2. Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen
      Pages 114-129
  4. Trusted Technologies

    1. Front Matter
      Pages 151-151
    2. Zheng Tao, Jun Hu, Jing Zhan, Mo Li, Chunzi Chen
      Pages 153-168
  5. Software and System Security

    1. Front Matter
      Pages 201-201
    2. Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai
      Pages 203-213
    3. Guan Wang, Ziyi Wang, Jian Sun, Jun Zhou
      Pages 226-233
  6. Back Matter
    Pages 235-235

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015.

The revised 12 full papers presented have been carefully reviewed and selected from 29 submissions. They are devoted to all aspects of trusted computing systems, including trusted modules, platforms; networks, services and applications. The papers are organized in the following sections: encryptions and signatures; security model; trusted technologies; software and system security.

Keywords

Encryption and signatures Mobile and wireless security Public key techniques Security and privacy Software and system security Access control Anonymity Authentication Cryptographic protocols Key management Malware detection Network security Oblivious transfer Privacy-preserving RSA Security model Side-channel attacks Signature generation Trusted computing Trusted technologies

Editors and affiliations

  • Moti Yung
    • 1
  • Jianbiao Zhang
    • 2
  • Zhen Yang
    • 3
  1. 1.Computer ScienceColumbia UniversityNew YorkUSA
  2. 2.Key Laboratory of Trusted ComputingBeijing University of TechnologyBeijingChina
  3. 3.Key Laboratory of Trusted ComputingBeijing University of TechnologyBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-31550-8
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-31549-2
  • Online ISBN 978-3-319-31550-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site