000 | 03448nam a22006975i 4500 | ||
---|---|---|---|
001 | 978-3-642-30921-2 | ||
003 | DE-He213 | ||
005 | 20240730191447.0 | ||
007 | cr nn 008mamaa | ||
008 | 120608s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642309212 _9978-3-642-30921-2 |
||
024 | 7 |
_a10.1007/978-3-642-30921-2 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aTrust and Trustworthy Computing _h[electronic resource] : _b5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings / _cedited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXII, 341 p. 91 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7344 |
|
520 | _aThis book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9146170 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aApplication software. _9146171 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9146172 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9146173 |
700 | 1 |
_aKatzenbeisser, Stefan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9146174 |
|
700 | 1 |
_aWeippl, Edgar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9146175 |
|
700 | 1 |
_aCamp, L. Jean. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9146176 |
|
700 | 1 |
_aVolkamer, Melanie. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9146177 |
|
700 | 1 |
_aReiter, Mike. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9146178 |
|
700 | 1 |
_aZhang, Xinwen. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9146179 |
|
710 | 2 |
_aSpringerLink (Online service) _9146180 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642309205 |
776 | 0 | 8 |
_iPrinted edition: _z9783642309229 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7344 _9146181 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-30921-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93751 _d93751 |