Description
Trusted Systems, 2012
Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers
Security and Cryptology Series
Coordinators: Chen Liqun, Yung Moti, Zhu Liehuang
Language: EnglishSubject for Trusted Systems:
Keywords
authentication; encryption; hash functions; mobile phones; protocols
351 p. · 15.5x23.5 cm · Paperback
Description
/li>Contents
/li>Biography
/li>Comment
/li>
A Flexible Software Development and Emulation Framework for ARM TrustZone.- Mass Transit Ticketing with NFC Mobile Phones.- Some Improvements to the Cost-Based Framework for Analyzing.- Denial of Service Attacks.- Fault Detection of the MacGuffin Cipher against Differential Fault Attack.- Computationally Sound Symbolic Analysis of EAP-TNC Protocol.- A Technique for Remote Detection of Certain Virtual Machine Monitors.- Indifferentiability of Domain Extension Modes for Hash Functions.
Fast conference proceedings.- State-of-the-art report.- Up to date results.
Unique visibility
State-of-the-art research
Fast-track conference proceedings