Katzenbeisser, Stefan and Weippl, Edgar and Camp, Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen (2012):
Trust and Trustworthy Computing.
Springer, ISBN 978-3-642-30921-2,
DOI: 10.1007/978-3-642-30921-2,
[Book]
Abstract
<div class="springer-html" style="border: 0px; font-variant-numeric: inherit; font-stretch: inherit; font-size: 13px; line-height: 1.6; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif; margin: 0px; padding: 0px; vertical-align: baseline; max-height: 110px; overflow: hidden; color: rgb(51, 51, 51); "><p style="border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; padding: 0px; vertical-align: baseline; ">This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.</p> <div></div></div> <div class="action-footer" style="border: 0px; font-variant-numeric: inherit; font-stretch: inherit; font-size: 13px; line-height: 13px; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif; margin: 0px; padding: 0px; vertical-align: baseline; max-height: 110px; overflow: hidden; color: rgb(51, 51, 51); "></div>
Item Type: | Book |
---|---|
Erschienen: | 2012 |
Creators: | Katzenbeisser, Stefan and Weippl, Edgar and Camp, Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen |
Title: | Trust and Trustworthy Computing |
Language: | English |
Abstract: | <div class="springer-html" style="border: 0px; font-variant-numeric: inherit; font-stretch: inherit; font-size: 13px; line-height: 1.6; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif; margin: 0px; padding: 0px; vertical-align: baseline; max-height: 110px; overflow: hidden; color: rgb(51, 51, 51); "><p style="border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; padding: 0px; vertical-align: baseline; ">This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.</p> <div></div></div> <div class="action-footer" style="border: 0px; font-variant-numeric: inherit; font-stretch: inherit; font-size: 13px; line-height: 13px; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif; margin: 0px; padding: 0px; vertical-align: baseline; max-height: 110px; overflow: hidden; color: rgb(51, 51, 51); "></div> |
Number: | 1 |
Publisher: | Springer |
ISBN: | 978-3-642-30921-2 |
Uncontrolled Keywords: | Security, Usability and Society |
Divisions: | LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt 20 Department of Computer Science > SECUSO - Security, Usability and Society Profile Areas > Cybersecurity (CYSEC) LOEWE > LOEWE-Zentren 20 Department of Computer Science Profile Areas LOEWE |
Event Location: | Wien |
Date Deposited: | 28 Jul 2016 18:35 |
DOI: | 10.1007/978-3-642-30921-2 |
Identification Number: | TUD-CS-2012-0356 |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
![]() |
Send an inquiry |
Options (only for editors)
![]() |
Show editorial Details |