LEADER 04080nam 22008175 450 001 996465758703316 005 20230426072704.0 010 $a3-642-32298-0 024 7 $a10.1007/978-3-642-32298-3 035 $a(CKB)3400000000085807 035 $a(SSID)ssj0000746169 035 $a(PQKBManifestationID)11410838 035 $a(PQKBTitleCode)TC0000746169 035 $a(PQKBWorkID)10862028 035 $a(PQKB)11193885 035 $a(DE-He213)978-3-642-32298-3 035 $a(MiAaPQ)EBC3069938 035 $a(PPN)168321491 035 $a(EXLCZ)993400000000085807 100 $a20120711d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrusted Systems$b[electronic resource] $eThird International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers /$fedited by Liqun Chen, Moti Yung, Liehuang Zhu 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XII, 351 p. 77 illus.) 225 1 $aSecurity and Cryptology ;$v7222 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-32297-2 320 $aIncludes bibliographical references and author index. 327 $aA Flexible Software Development and Emulation Framework for ARM TrustZone -- Mass Transit Ticketing with NFC Mobile Phones --  Some Improvements to the Cost-Based Framework for Analyzing -- Denial of Service Attacks --  Fault Detection of the MacGuffin Cipher against Differential Fault Attack -- Computationally Sound Symbolic Analysis of EAP-TNC Protocol -- A Technique for Remote Detection of Certain Virtual Machine Monitors --  Indifferentiability of Domain Extension Modes for Hash Functions. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation. 410 0$aSecurity and Cryptology ;$v7222 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing?Management 606 $aComputer networks 606 $aComputers and civilization 606 $aInformation technology?Management 606 $aData and Information Security 606 $aCryptology 606 $aIT Operations 606 $aComputer Communication Networks 606 $aComputers and Society 606 $aComputer Application in Administrative Data Processing 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing?Management. 615 0$aComputer networks. 615 0$aComputers and civilization. 615 0$aInformation technology?Management. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aComputer Communication Networks. 615 24$aComputers and Society. 615 24$aComputer Application in Administrative Data Processing. 676 $a005.8 702 $aChen$b Liqun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhu$b Liehuang$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aINTRUST 2011 906 $aBOOK 912 $a996465758703316 996 $aTrusted Systems$92556477 997 $aUNISA