000 | 05128nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-642-14597-1 | ||
003 | DE-He213 | ||
005 | 20240730185346.0 | ||
007 | cr nn 008mamaa | ||
008 | 100709s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642145971 _9978-3-642-14597-1 |
||
024 | 7 |
_a10.1007/978-3-642-14597-1 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUYA _2bicssc |
|
072 | 7 |
_aCOM014000 _2bisacsh |
|
072 | 7 |
_aUYA _2thema |
|
082 | 0 | 4 |
_a004.0151 _223 |
245 | 1 | 0 |
_aTrusted Systems _h[electronic resource] : _bFirst International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings / _cedited by Liqun Chen, Moti Yung. |
250 | _a1st ed. 2010. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2010. |
|
300 |
_aXIV, 263 p. 64 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v6163 |
|
505 | 0 | _aInvited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage -- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing -- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks -- Attestation -- Remote Attestation on Function Execution (Work-in-Progress) -- Scalable Remote Attestation with Privacy Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network -- SocialClouds: Concept, Security Architecture and Some Mechanisms -- Privacy Enhanced Trusted Network Connect -- Research on Multistage Interconnection Architecture and Collision Detection Model -- Virtualization -- Trusted Virtual Domains - Design, Implementation and Lessons Learned -- Trusted Integrity Measurement and Reporting for Virtualized Platforms -- Applications -- A Feather-Weight Application Isolation Model -- Exploring Trust of Mobile Applications Based on User Behaviors -- Trusted Firmware Services Based on TPM -- Supporting Technology -- Improved Cryptanalysis of the FOX Block Cipher -- Bitwise Higher Order Differential Cryptanalysis. | |
520 | _aThis volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. | ||
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9138964 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aTheory of Computation. _9138965 |
650 | 2 | 4 |
_aComputer Communication Networks. _9138966 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aChen, Liqun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9138967 |
|
700 | 1 |
_aYung, Moti. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9138968 |
|
710 | 2 |
_aSpringerLink (Online service) _9138969 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642145964 |
776 | 0 | 8 |
_iPrinted edition: _z9783642145988 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v6163 _9138970 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-14597-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92779 _d92779 |