Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings / [electronic resource] :
edited by Chris J. Mitchell, Allan Tomlinson.
- Berlin, Heidelberg : Springer Berlin Heidelberg, 2012.
- 1 online resource (X, 117 p. 20 ill.)
- Lecture Notes in Computer Science, 7711 0302-9743 ; .
Automatic Analysis of Security Properties of the TPM -- Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees -- Secure Implementation of Asynchronous Method Calls and Futures -- Establishing Trust between Nodes in Mobile Ad-Hoc Networks -- Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards? -- Security in the Distributed Internet of Things -- A Multi-criteria-Based Evaluation of Android Applications -- Security Analysis of an Open Car Immobilizer Protocol Stack -- A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes -- The Yin and Yang Sides of Embedded Security.
9783642353710
Computer science. Computer communication systems. Computer security. Data encryption (Computer science). Application software. Computers and civilization. Management information systems.