Detecting and Defending against Malicious Attacks in the iTrust ...
Detecting and Defending against Malicious Attacks in the iTrust ...
Detecting and Defending against Malicious Attacks in the iTrust ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Future Work<br />
We plan to <strong>in</strong>vestigate o<strong>the</strong>r possible malicious attacks<br />
on <strong>iTrust</strong> <strong>and</strong> countermeasures to such attacks<br />
We are develop<strong>in</strong>g ano<strong>the</strong>r implementation of <strong>iTrust</strong><br />
based on SMS to operate on mobile phones<br />
We plan to make <strong>the</strong> <strong>iTrust</strong> source code, tools, <strong>and</strong><br />
documentation freely available to all<br />
ICOIN 2012 <strong>iTrust</strong> Yung-T<strong>in</strong>g Chuang