default search action
6. INTRUST 2014: Beijing, China
- Moti Yung, Liehuang Zhu, Yanjiang Yang:
Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers. Lecture Notes in Computer Science 9473, Springer 2015, ISBN 978-3-319-27997-8 - Hiroaki Anada, Junpei Kawamoto, Jian Weng, Kouichi Sakurai:
Identity-Embedding Method for Decentralized Public-Key Infrastructure. 1-14 - Sampsa Rauti, Samuel Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, Sami Hyrynsalmi, Ville Leppänen:
Diversification of System Calls in Linux Binaries. 15-35 - Chao Li, Bo Lang, Jinmiao Wang:
Outsourced KP-ABE with Enhanced Security. 36-50 - Dan Ding, Guizhen Zhu:
A Simulated Annealing Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors. 51-69 - Veronika Kuchta, Mark Manulis:
Rerandomizable Threshold Blind Signatures. 70-89 - Jiaqi Hong, Haixia Xu, Peili Li:
Verifiable Computation of Large Polynomials. 90-104 - Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
A Characterization of Cybersecurity Posture from Network Telescope Data. 105-126 - Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia:
Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage. 127-136 - Jingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li:
Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set. 137-150 - Michael Weiß, Benjamin Weggenmann, Moritz August, Georg Sigl:
On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems. 151-167 - Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
How to Choose Interesting Points for Template Attacks More Effectively? 168-183 - Anbang Ruan, Andrew P. Martin:
NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust. 184-200 - Xuezhen Huang, Jiqiang Liu, Zhen Han:
A Privacy-Aware Access Model on Anonymized Data. 201-212 - Li Wang, Hongda Li, Fei Tang:
Functional Signatures from Indistinguishability Obfuscation. 213-227 - Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski, Piotr Syga:
Lightweight Protocol for Trusted Spontaneous Communication. 228-242 - Martin Hell, Linus Karlsson, Ben J. M. Smeets, Jelena Mirosavljevic:
Using TPM Secure Storage in Trusted High Availability Systems. 243-258 - Weili Han, Wei Wang, Xinyi Zhang, Weiwei Peng, Zheran Fang:
APP Vetting Based on the Consistency of Description and APK. 259-277 - Yan Zhu, Dandan Li, Liguang Yang:
Traitor Tracing Based on Partially-Ordered Hierarchical Encryption. 278-293 - Gaoshou Zhai, Tao Guo, Jie Huang:
SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs. 294-309 - Fan Zhang, Liangze Li, Hongfeng Wu:
Faster Pairing Computation on Jacobi Quartic Curves with High-Degree Twists. 310-327 - Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng:
DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes. 328-345 - Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Template Attacks Based on Priori Knowledge. 346-363 - Wenying Zhang, Jiaqi Zhang, Xiangqian Zheng:
Some Observations on the Lightweight Block Cipher Piccolo-80. 364-373 - Yun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang:
A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases. 374-393 - Chenggen Song, Xin Liu, Yalong Yan:
Efficient Public Key Encryption with Field-Free Conjunctive Keywords Search. 394-406 - Baoping Tian, Fushan Wei, Chuangui Ma:
mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group. 407-421 - Takashi Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, Kazuo Ohta:
Secure (M+1) st-Price Auction with Automatic Tie-Break. 422-437
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.