06.06.2013 Views

Detecting and Defending against Malicious Attacks in the iTrust ...

Detecting and Defending against Malicious Attacks in the iTrust ...

Detecting and Defending against Malicious Attacks in the iTrust ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Future Work<br />

We plan to <strong>in</strong>vestigate o<strong>the</strong>r possible malicious attacks<br />

on <strong>iTrust</strong> <strong>and</strong> countermeasures to such attacks<br />

We are develop<strong>in</strong>g ano<strong>the</strong>r implementation of <strong>iTrust</strong><br />

based on SMS to operate on mobile phones<br />

We plan to make <strong>the</strong> <strong>iTrust</strong> source code, tools, <strong>and</strong><br />

documentation freely available to all<br />

ICOIN 2012 <strong>iTrust</strong> Yung-T<strong>in</strong>g Chuang

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!