My Account Log in

1 option

Trust and Trustworthy Computing : 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings / edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Katzenbeisser, Stefan, editor.
Weippl, Edgar, editor.
Camp, L. Jean, editor.
Volkamer, Melanie, editor.
Reiter, Mike, editor.
Zhang, Xinwen, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 7344.
Security and Cryptology ; 7344
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Management information systems.
Computer science.
Algorithms.
Computers and civilization.
Application software.
Cryptology.
Computer Communication Networks.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Computers and Society.
Information Systems Applications (incl. Internet).
Local Subjects:
Cryptology.
Computer Communication Networks.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Computers and Society.
Information Systems Applications (incl. Internet).
Physical Description:
1 online resource (XII, 341 pages) : 91 illustrations.
Edition:
First edition 2012.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
Other Format:
Printed edition:
ISBN:
978-3-642-30921-2
9783642309212
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account