Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings / [electronic resource] :
edited by Thorsten Holz, Sotiris Ioannidis.
- 1st ed. 2014.
- XII, 226 p. 67 illus. online resource.
- Security and Cryptology, 8564 2946-1863 ; .
- Security and Cryptology, 8564 .
TPM 2.0 -- Trust in embedded and mobile systems -- Physical unclonable functions -- Trust in the web -- Trust and trustworthiness.
This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.
9783319085937
10.1007/978-3-319-08593-7 doi
Data protection.
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Computer networks .
Data and Information Security.
IT Operations.
Cryptology.
Computers and Society.
Computer Communication Networks.
QA76.9.A25
005.8
TPM 2.0 -- Trust in embedded and mobile systems -- Physical unclonable functions -- Trust in the web -- Trust and trustworthiness.
This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.
9783319085937
10.1007/978-3-319-08593-7 doi
Data protection.
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Computer networks .
Data and Information Security.
IT Operations.
Cryptology.
Computers and Society.
Computer Communication Networks.
QA76.9.A25
005.8