Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings

This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully...

Full description

Bibliographic Details
Other Authors: Mitchell, Chris J. (Editor), Tomlinson, Allan (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2012, 2012
Edition:1st ed. 2012
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Automatic Analysis of Security Properties of the TPM
  • Stamp and Extend – Instant But Undeniable Timestamping Based on Lazy Trees
  • Secure Implementation of Asynchronous Method Calls and Futures
  • Establishing Trust between Nodes in Mobile Ad-Hoc Networks
  • Panel Discussion: Mobile Device Trust — How Do We Link Social Needs, Technical Requirements, Techniques and Standards?
  • Security in the Distributed Internet of Things
  • A Multi-criteria-Based Evaluation of Android Applications
  • Security Analysis of an Open Car Immobilizer Protocol Stack
  • A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes
  • The Yin and Yang Sides of Embedded Security