Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 - July 2, 2014. Proceedings / [electronic resource] :
edited by Thorsten Holz, Sotiris Ioannidis.
- XII, 226 p. 67 illus. online resource.
- Lecture Notes in Computer Science, 8564 0302-9743 ; .
- Lecture Notes in Computer Science, 8564 .
TPM 2.0 -- Trust in embedded and mobile systems -- Physical unclonable functions -- Trust in the web -- Trust and trustworthiness.
This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.
9783319085937
10.1007/978-3-319-08593-7 doi
Computer science.
Computer security.
Data encryption (Computer science).
Computers.
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Management of Computing and Information Systems.
Data Encryption.
Computers and Society.
Information Systems and Communication Service.
QA76.9.A25
005.8
TPM 2.0 -- Trust in embedded and mobile systems -- Physical unclonable functions -- Trust in the web -- Trust and trustworthiness.
This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.
9783319085937
10.1007/978-3-319-08593-7 doi
Computer science.
Computer security.
Data encryption (Computer science).
Computers.
Computers and civilization.
Management information systems.
Computer Science.
Systems and Data Security.
Management of Computing and Information Systems.
Data Encryption.
Computers and Society.
Information Systems and Communication Service.
QA76.9.A25
005.8