Login / Signup
INTRUST
2009
2012
2016
2009
2016
Keyphrases
Publications
volume 9565, 2016
Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers
INTRUST
9565 (2016)
2015
Veronika Kuchta
,
Mark Manulis
Public Key Encryption with Distributed Keyword Search.
INTRUST
(2015)
Li Lin
,
Jian Ni
,
Jian Hu
,
Jian-biao Zhang
RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform.
INTRUST
(2015)
Takanori Yasuda
,
Hiroaki Anada
,
Kouichi Sakurai
Application of NTRU Using Group Rings to Partial Decryption Technique.
INTRUST
(2015)
Antonio de la Piedra
Efficient Implementation of AND, OR and NOT Operators for ABCs.
INTRUST
(2015)
Hui Zhao
,
Kouichi Sakurai
Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS.
INTRUST
(2015)
Naoto Yanai
,
Masahiro Mambo
,
Kazuma Tanaka
,
Takashi Nishide
,
Eiji Okamoto
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs.
INTRUST
(2015)
Huishan Bian
,
Liehuang Zhu
,
Meng Shen
,
Mingzhong Wang
,
Chang Xu
,
Qiongyu Zhang
Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks.
INTRUST
(2015)
Huafei Zhu
Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance.
INTRUST
(2015)
Jiun Yi Yap
,
Allan Tomlinson
A Causality-Based Model for Describing the Trustworthiness of a Computing Device.
INTRUST
(2015)
Jie Wang
,
Xiaoxian He
A Signature Generation Approach Based on Clustering for Polymorphic Worm.
INTRUST
(2015)
Miguel Urquidi
,
Dalia Khader
,
Jean Lancrenon
,
Liqun Chen
Attribute-Based Signatures with Controllable Linkability.
INTRUST
(2015)
Guan Wang
,
Ziyi Wang
,
Jian Sun
,
Jun Zhou
An Audit Log Protection Mechanism Based on Security Chip.
INTRUST
(2015)
Zheng Tao
,
Jun Hu
,
Jing Zhan
,
Mo Li
,
Chunzi Chen
An Application-Oriented Efficient Encapsulation System for Trusted Software Development.
INTRUST
(2015)
Lin Yan
,
Jian-biao Zhang
Research on Trusted Bootstrap Based on the Universal Smart Card.
INTRUST
(2015)
Huafei Zhu
Universally Composable Oblivious Database in the Presence of Malicious Adversaries.
INTRUST
(2015)
volume 9473, 2015
Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers
INTRUST
9473 (2015)
2014
Guangjun Fan
,
Yongbin Zhou
,
Hailong Zhang
,
Dengguo Feng
How to Choose Interesting Points for Template Attacks More Effectively?
INTRUST
(2014)
Guangjun Fan
,
Yongbin Zhou
,
Hailong Zhang
,
Dengguo Feng
Template Attacks Based on Priori Knowledge.
INTRUST
(2014)
Jingfeng Xue
,
Yan Zhang
,
Changzhen Hu
,
Hongyu Ren
,
Zhiqiang Li
Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set.
INTRUST
(2014)
Gaoshou Zhai
,
Tao Guo
,
Jie Huang
SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs.
INTRUST
(2014)
Min Zhu
,
Bibo Tu
,
Ruibang You
,
Yanzhao Li
,
Dan Meng
DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes.
INTRUST
(2014)
Fan Zhang
,
Liangze Li
,
Hongfeng Wu
Faster Pairing Computation on Jacobi Quartic Curves with High-Degree Twists.
INTRUST
(2014)
Przemyslaw Blaskiewicz
,
Marek Klonowski
,
Miroslaw Kutylowski
,
Piotr Syga
Lightweight Protocol for Trusted Spontaneous Communication.
INTRUST
(2014)
Anbang Ruan
,
Andrew P. Martin
NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust.
INTRUST
(2014)
Martin Hell
,
Linus Karlsson
,
Ben J. M. Smeets
,
Jelena Mirosavljevic
Using TPM Secure Storage in Trusted High Availability Systems.
INTRUST
(2014)
Weili Han
,
Wei Wang
,
Xinyi Zhang
,
Weiwei Peng
,
Zheran Fang
APP Vetting Based on the Consistency of Description and APK.
INTRUST
(2014)
Li Wang
,
Hongda Li
,
Fei Tang
Functional Signatures from Indistinguishability Obfuscation.
INTRUST
(2014)
Michael Weiß
,
Benjamin Weggenmann
,
Moritz August
,
Georg Sigl
On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems.
INTRUST
(2014)
Hiroaki Anada
,
Junpei Kawamoto
,
Jian Weng
,
Kouichi Sakurai
Identity-Embedding Method for Decentralized Public-Key Infrastructure.
INTRUST
(2014)
Yun-Ju Huang
,
Wei-Chih Hong
,
Chen-Mou Cheng
,
Jiun-Ming Chen
,
Bo-Yin Yang
A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases.
INTRUST
(2014)
Jiaqi Hong
,
Haixia Xu
,
Peili Li
Verifiable Computation of Large Polynomials.
INTRUST
(2014)
Hua Guo
,
Fangchao Ma
,
Zhoujun Li
,
Chunhe Xia
Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage.
INTRUST
(2014)
Chao Li
,
Bo Lang
,
Jinmiao Wang
Outsourced KP-ABE with Enhanced Security.
INTRUST
(2014)
Xuezhen Huang
,
Jiqiang Liu
,
Zhen Han
A Privacy-Aware Access Model on Anonymized Data.
INTRUST
(2014)
Zhenxin Zhan
,
Maochao Xu
,
Shouhuai Xu
A Characterization of Cybersecurity Posture from Network Telescope Data.
INTRUST
(2014)
Yan Zhu
,
Dandan Li
,
Liguang Yang
Traitor Tracing Based on Partially-Ordered Hierarchical Encryption.
INTRUST
(2014)
Baoping Tian
,
Fushan Wei
,
Chuangui Ma
mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group.
INTRUST
(2014)
Sampsa Rauti
,
Samuel Laurén
,
Shohreh Hosseinzadeh
,
Jari-Matti Mäkelä
,
Sami Hyrynsalmi
,
Ville Leppänen
Diversification of System Calls in Linux Binaries.
INTRUST
(2014)
Wenying Zhang
,
Jiaqi Zhang
,
Xiangqian Zheng
Some Observations on the Lightweight Block Cipher Piccolo-80.
INTRUST
(2014)
Veronika Kuchta
,
Mark Manulis
Rerandomizable Threshold Blind Signatures.
INTRUST
(2014)
Dan Ding
,
Guizhen Zhu
A Simulated Annealing Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors.
INTRUST
(2014)
Takashi Nishide
,
Mitsugu Iwamoto
,
Atsushi Iwasaki
,
Kazuo Ohta
Secure (M+1) st-Price Auction with Automatic Tie-Break.
INTRUST
(2014)
Chenggen Song
,
Xin Liu
,
Yalong Yan
Efficient Public Key Encryption with Field-Free Conjunctive Keywords Search.
INTRUST
(2014)
2013
Jiun Yi Yap
,
Allan Tomlinson
Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification.
INTRUST
(2013)
Fabio Martinelli
,
Ilaria Matteucci
,
Andrea Saracino
,
Daniele Sgandurra
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments.
INTRUST
(2013)
Michael Velten
,
Sascha Wessel
,
Frederic Stumpf
,
Claudia Eckert
Active File Integrity Monitoring Using Paravirtualized Filesystems.
INTRUST
(2013)
Leanid Krautsevich
,
Aliaksandr Lazouski
,
Fabio Martinelli
,
Artsiom Yautsiukhin
Towards Policy Engineering for Attribute-Based Access Control.
INTRUST
(2013)
Patrick Koeberl
,
Jiangtao Li
,
Wei Wu
A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions.
INTRUST
(2013)
volume 8292, 2013
Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings
INTRUST
8292 (2013)