Description
Trusted Systems, 1st ed. 2016
7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers
Security and Cryptology Series
Coordinators: Yung Moti, Zhang Jianbiao, Yang Zhen
Language: EnglishSubjects for Trusted Systems:
Keywords
Encryption and signatures; Mobile and wireless security; Public key techniques; Security and privacy; Software and system security; Access control; Anonymity; Authentication; Cryptographic protocols; Key management; Malware detection; Network security; Oblivious transfer; Privacy-preserving; RSA; Security model; Side-channel attacks; Signature generation; Trusted computing; Trusted technologies; combinatorics
235 p. · 15.5x23.5 cm · Paperback
Description
/li>Contents
/li>Comment
/li>
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015.
The revised 12 full papers presented have been carefully reviewed and selected from 29 submissions. They are devoted to all aspects of trusted computing systems, including trusted modules, platforms; networks, services and applications. The papers are organized in the following sections: encryptions and signatures; security model; trusted technologies; software and system security.
Includes supplementary material: sn.pub/extras