000 03492nam a22006975i 4500
001 978-3-642-21599-5
003 DE-He213
005 20240730175610.0
007 cr nn 008mamaa
008 110614s2011 gw | s |||| 0|eng d
020 _a9783642215995
_9978-3-642-21599-5
024 7 _a10.1007/978-3-642-21599-5
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aTrust and Trustworthy Computing
_h[electronic resource] :
_b4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings /
_cedited by Jonathan McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, Angela Sasse, Yolanta Beres.
250 _a1st ed. 2011.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2011.
300 _aVII, 314 p. 77 illus., 49 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6740
520 _aThis book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011. The 23 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in technical sessions on cloud and virtualization, physically unclonable functions, mobile device security, socio-economic aspects of trust, hardware trust, access control, privacy, trust aspects of routing, and cryptophysical protocols.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aElectronic data processing
_xManagement.
_9117269
650 0 _aAlgorithms.
_93390
650 0 _aComputers and civilization.
_921733
650 0 _aApplication software.
_9117270
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9117271
650 2 4 _aIT Operations.
_931703
650 2 4 _aAlgorithms.
_93390
650 2 4 _aComputers and Society.
_931668
650 2 4 _aComputer and Information Systems Applications.
_9117272
700 1 _aMcCune, Jonathan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9117273
700 1 _aBalacheff, Boris.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9117274
700 1 _aPerrig, Adrian.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9117275
700 1 _aSadeghi, Ahmad-Reza.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9117276
700 1 _aSasse, Angela.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9117277
700 1 _aBeres, Yolanta.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9117278
710 2 _aSpringerLink (Online service)
_9117279
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642215988
776 0 8 _iPrinted edition:
_z9783642216008
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6740
_9117280
856 4 0 _uhttps://doi.org/10.1007/978-3-642-21599-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c89989
_d89989