Trusted Systems (Record no. 52994)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03894nam a22006255i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-27998-5 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200420221257.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160129s2015 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319279985 |
-- | 978-3-319-27998-5 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Trusted Systems |
Sub Title | 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2015. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XIII, 442 p. 83 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Signature and authentication -- Secure protocols and access control -- Cloud security -- cryptographic aspects -- Software security -- Security analysis -- Secure communication and privacy. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Mathematics. |
700 1# - AUTHOR 2 | |
Author 2 | Yung, Moti. |
700 1# - AUTHOR 2 | |
Author 2 | Zhu, Liehuang. |
700 1# - AUTHOR 2 | |
Author 2 | Yang, Yanjiang. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-27998-5 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2015. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer communication systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Operating systems (Computers). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Management information systems. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Encryption. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Operating Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Management of Computing and Information Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Discrete Mathematics in Computer Science. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 0302-9743 ; |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-LNC |
No items available.