Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings / [electronic resource] : edited by Chris J. Mitchell, Allan Tomlinson. - Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. - 1 online resource (X, 117 p. 20 ill.) - Lecture Notes in Computer Science, 7711 0302-9743 ; .

Automatic Analysis of Security Properties of the TPM -- Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees -- Secure Implementation of Asynchronous Method Calls and Futures -- Establishing Trust between Nodes in Mobile Ad-Hoc Networks -- Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards? -- Security in the Distributed Internet of Things -- A Multi-criteria-Based Evaluation of Android Applications -- Security Analysis of an Open Car Immobilizer Protocol Stack -- A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes -- The Yin and Yang Sides of Embedded Security.

9783642353710


Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Application software.
Computers and civilization.
Management information systems.