Trust and Trustworthy Computing [electronic resource] : 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings / edited by Mauro Conti, Matthias Schunter, Ioannis Askoxylakis.
Contributor(s): Conti, Mauro [editor.] | Schunter, Matthias [editor.] | Askoxylakis, Ioannis [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 9229Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015.Description: XI, 328 p. 79 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319228464.Subject(s): Data protection | Electronic data processing -- Management | Cryptography | Data encryption (Computer science) | Computers and civilization | Computer networks | Data and Information Security | IT Operations | Cryptology | Computers and Society | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.No physical items for this record
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.
There are no comments for this item.