Normal view MARC view ISBD view

Trust and Trustworthy Computing [electronic resource] : 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings / edited by Mauro Conti, Matthias Schunter, Ioannis Askoxylakis.

Contributor(s): Conti, Mauro [editor.] | Schunter, Matthias [editor.] | Askoxylakis, Ioannis [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 9229Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015.Description: XI, 328 p. 79 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319228464.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Computers | Computers and civilization | Management information systems | Computer Science | Systems and Data Security | Management of Computing and Information Systems | Data Encryption | Computers and Society | Information Systems and Communication ServiceAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.

There are no comments for this item.

Log in to your account to post a comment.