Trust and Trustworthy Computing [electronic resource] : 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings / edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang.
Contributor(s): Katzenbeisser, Stefan [editor.] | Weippl, Edgar [editor.] | Camp, L. Jean [editor.] | Volkamer, Melanie [editor.] | Reiter, Mike [editor.] | Zhang, Xinwen [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 7344Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012Edition: 1st ed. 2012.Description: XII, 341 p. 91 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642309212.Subject(s): Cryptography | Data encryption (Computer science) | Computer networks | Electronic data processing -- Management | Algorithms | Computers and civilization | Application software | Cryptology | Computer Communication Networks | IT Operations | Algorithms | Computers and Society | Computer and Information Systems ApplicationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.No physical items for this record
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
There are no comments for this item.