Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9473)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: INTRUST 2014.
Buy print copy
About this book
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014.
The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.
/* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}
Similar content being viewed by others
Keywords
- authentication
- distributed systems security
- intrusion detection
- network security
- trusted computing
- access control
- access control
- elliptic curve
- embedded systems
- information accountability
- key management
- logic and verification
- malware
- multiparty computation
- privacy-preserving protocols
- public key cryptography
- RSA
- side-channel attacks
- trust frameworks
- usage control
Table of contents (27 papers)
Other volumes
-
Trusted Systems
Editors and Affiliations
Bibliographic Information
Book Title: Trusted Systems
Book Subtitle: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers
Editors: Moti Yung, Liehuang Zhu, Yanjiang Yang
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-27998-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-27997-8Published: 30 January 2016
eBook ISBN: 978-3-319-27998-5Published: 29 January 2016
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 442
Number of Illustrations: 83 illustrations in colour
Topics: Systems and Data Security, Cryptology, Operating Systems, Computer Communication Networks, Management of Computing and Information Systems, Discrete Mathematics in Computer Science