LEADER 04480nam 22007935 450 001 996465964203316 005 20210430144518.0 010 $a3-642-35371-1 024 7 $a10.1007/978-3-642-35371-0 035 $a(CKB)3400000000102905 035 $a(SSID)ssj0000880085 035 $a(PQKBManifestationID)11546676 035 $a(PQKBTitleCode)TC0000880085 035 $a(PQKBWorkID)10873280 035 $a(PQKB)10173530 035 $a(DE-He213)978-3-642-35371-0 035 $a(MiAaPQ)EBC3068791 035 $a(PPN)168328534 035 $a(EXLCZ)993400000000102905 100 $a20121214d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrusted Systems $e4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings /$fedited by Chris J. Mitchell, Allan Tomlinson 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (X, 117 p. 20 illus.) 225 1 $aSecurity and Cryptology ;$v7711 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-35370-3 320 $aIncludes bibliographical references and index. 327 $aAutomatic Analysis of Security Properties of the TPM -- Stamp and Extend ? Instant But Undeniable Timestamping Based on Lazy Trees -- Secure Implementation of Asynchronous Method Calls and Futures -- Establishing Trust between Nodes in Mobile Ad-Hoc Networks -- Panel Discussion: Mobile Device Trust ? How Do We Link Social Needs, Technical Requirements, Techniques and Standards? -- Security in the Distributed Internet of Things -- A Multi-criteria-Based Evaluation of Android Applications -- Security Analysis of an Open Car Immobilizer Protocol Stack -- A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes -- The Yin and Yang Sides of Embedded Security. 330 $aThis book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security. 410 0$aSecurity and Cryptology ;$v7711 606 $aSeguridad informática 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aComputers and civilization 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 615 04$aSeguridad informática 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aComputers and civilization. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 615 24$aComputers and Society. 615 24$aComputer Appl. in Administrative Data Processing. 676 $a005.8 702 $aMitchell$b Chris J$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTomlinson$b Allan$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465964203316 996 $aTrusted Systems$92556477 997 $aUNISA