Trusted Services |
A Flexible Software Development and Emulation Framework for ARM TrustZone / Johannes Winter ; Paul Wiegele ; Martin Pirker ; Ronald Tögl |
Building General Purpose Security Services on Trusted Computing / Chunhua Chen ; Chris J. Mitchell ; Shaohua Tang |
Enforcing Sticky Policies with TPM and Virtualization / Gina Kounga ; Liqun Chen |
Mobile Trusted Systems |
Mass Transit Ticketing with NFC Mobile Phones / Jan-Erik Ekberg ; Sandeep Tamrakar |
Anonymous Ticketing for NFC-Enabled Mobile Phones / David Derler ; Klaus Potzmader ; Kurt Dietrich |
Security Analysis |
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks / Qinggang Yue ; Feng Liu ; Rui Xue |
Fault Detection of the MacGuffin Cipher against Differential Fault Attack / Wei Li ; Dawu Gu ; Zhiqiang Liu ; Ya Liu ; Xiaohu Huang |
Computationally Sound Symbolic Analysis of EAP-TNC Protocol / Zijian Zhang ; Liehuang Zhu ; Feng Wang ; Lejian Liao ; Gong Guo ; Hongyuan Wang |
A Technique for Remote Detection of Certain Virtual Machine Monitors / Christopher Jämthagen ; Martin Hell ; Ben Smeets |
Cryptographic Aspects |
Indifferentiability of Domain Extension Modes for Hash Functions / Yiyuam Luo ; Xuejia Lai ; Zheng Gong |
Multicollisions and Graph-Based Hash Functions / Kimmo Halunen |
A General, Flexible and Efficient Proof of Inclusion and Exclusion / Kun Peng |
MQQ-SIG: An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme / Danilo Gligoroski ; Rune Steinsmo ; Ødegard ; Rune Erlend Jensen ; Ludovic Perret ; Jean-Charles Faugère ; Svein Johan Knapskog ; Smile Markovski |
Multifactor Authenticated Key Renewal / Shin'ichiro Matsuo ; Daisuke Moriyama ; Moti Yung |
Restricted Identification Scheme and Diffie-Hellman Linking Problem / Miroslaw Kutylowski ; Lukasz Krzywiecki ; Przemyslaw Kubiak ; Michal Koza |
Trusted Networks |
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks / Dong Hao ; Avishek Adhikari ; Kouichi Sakurai |
Hash Chains at the Basis of a Secure Reactive Routing Protocol / Thouraya Bouabana-Tebibel |
Implementation |
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM / Patrick Koeberl ; Jiangtao Li ; Roel Maes ; Anand Rajan ; Claire Vishik ; Marcin Wójcik |
A Performance Analysis of Identity-Based Encryption Schemes / Pengqi Cheng ; Yan Gu ; Zihong Lu ; Jianfei Wang ; Wenlei Zhu ; Zhen Chen ; Jiwei Huang |
Direct Anonymous Attestation |
A (Corrected) DAA Scheme Using Batch Proof and Verification / Ernie Brickell |
DAA Protocol Analysis and Verification / Yu Qin ; Xiaobo Chu ; Dengguo Feng ; Wei Feng |
Author Index |
Trusted Services |
A Flexible Software Development and Emulation Framework for ARM TrustZone / Johannes Winter ; Paul Wiegele ; Martin Pirker ; Ronald Tögl |
Building General Purpose Security Services on Trusted Computing / Chunhua Chen ; Chris J. Mitchell ; Shaohua Tang |