Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings / [electronic resource] : edited by Thorsten Holz, Sotiris Ioannidis. - 1st ed. 2014. - XII, 226 p. 67 illus. online resource. - Security and Cryptology, 8564 2946-1863 ; . - Security and Cryptology, 8564 .

TPM 2.0 -- Trust in embedded and mobile systems -- Physical unclonable functions -- Trust in the web -- Trust and trustworthiness.

This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.

9783319085937

10.1007/978-3-319-08593-7 doi


Data protection.
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Computer networks .
Data and Information Security.
IT Operations.
Cryptology.
Computers and Society.
Computer Communication Networks.

QA76.9.A25

005.8