Trusted systems: 5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8292 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (VIII, 102 S.) graph. Darst. |
ISBN: | 9783319034904 9783319034911 |
DOI: | 10.1007/978-3-319-03491-1 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041587488 | ||
003 | DE-604 | ||
005 | 20140228 | ||
007 | cr|uuu---uuuuu | ||
008 | 140124s2013 xx d||| o|||| 10||| eng d | ||
020 | |a 9783319034904 |9 978-3-319-03490-4 | ||
020 | |a 9783319034911 |c eISBN |9 978-3-319-03491-1 | ||
024 | 7 | |a 10.1007/978-3-319-03491-1 |2 doi | |
035 | |a (OCoLC)864452380 | ||
035 | |a (DE-599)BVBBV041587488 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Trusted systems |b 5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings |c Roderick Bloem ... (eds.) |
264 | 1 | |a Cham [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (VIII, 102 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8292 | |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Graz |2 gnd-content | |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Bloem, Roderick |e Sonstige |0 (DE-588)1044944110 |4 oth | |
711 | 2 | |a INTRUST |n 5. |d 2013 |c Graz |j Sonstige |0 (DE-588)1044944927 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 8292 |w (DE-604)BV014880109 |9 8292 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-03491-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027032621&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027032621&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027032621 |
Datensatz im Suchindex
_version_ | 1820875554043199488 |
---|---|
adam_text |
TRUSTED SYSTEMS
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
HARDWARE-BASED SECURITY AND APPLICATIONS
PARA-VIRTUALIZING THE TRUSTED PLATFORM MODULE: AN ENTERPRISE
FRAMEWORK BASED ON VERSION 2.0 SPECIFICATION
THE PACE|CA PROTOCOL FOR MACHINE READABLE TRAVEL DOCUMENTS
A SPATIAL MAJORITY VOTING TECHNIQUE TO REDUCE ERROR RATE OF PHYSICALLY
UNCLONABLE FUNCTIONS
ACCESS CONTROL, INTEGRITY AND POLICY ENFORCEMENT
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
TRUSTED SYSTEMS
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED CONFERENCE PROCEEDINGS OF
THE 5TH INTERNATIONAL CONFERENCE ON TRUSTED SYSTEMS, INTRUST 2013, HELD
IN GRAZ, AUSTRIA, IN DECEMBER 2013. THE REVISED FULL PAPERS FOCUS ON THE
THEORY, TECHNOLOGIES AND APPLICATIONS OF TRUSTED SYSTEMS. THEY COVER ALL
ASPECTS OF TRUSTED COMPUTING SYSTEMS, INCLUDING TRUSTED MODULES,
PLATFORMS, NETWORKS, SERVICES AND APPLICATIONS, FROM THEIR FUNDAMENTAL
FEATURES AND FUNCTIONALITIES TO DESIGN PRINCIPLES, ARCHITECTURE AND
IMPLEMENTATION TECHNOLOGIES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1044944110 |
building | Verbundindex |
bvnumber | BV041587488 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 000 DAT 465f DAT 050f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)864452380 (DE-599)BVBBV041587488 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-03491-1 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041587488</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140228</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140124s2013 xx d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319034904</subfield><subfield code="9">978-3-319-03490-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319034911</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-319-03491-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-03491-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864452380</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041587488</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted systems</subfield><subfield code="b">5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings</subfield><subfield code="c">Roderick Bloem ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VIII, 102 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8292</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Graz</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bloem, Roderick</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1044944110</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">INTRUST</subfield><subfield code="n">5.</subfield><subfield code="d">2013</subfield><subfield code="c">Graz</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1044944927</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8292</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8292</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-03491-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027032621&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027032621&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027032621</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Graz gnd-content |
genre_facet | Konferenzschrift 2013 Graz |
id | DE-604.BV041587488 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:27Z |
institution | BVB |
institution_GND | (DE-588)1044944927 |
isbn | 9783319034904 9783319034911 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027032621 |
oclc_num | 864452380 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (VIII, 102 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Trusted systems 5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings Roderick Bloem ... (eds.) Cham [u.a.] Springer 2013 1 Online-Ressource (VIII, 102 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8292 Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Graz gnd-content Trusted Computing (DE-588)7562931-8 s DE-604 Bloem, Roderick Sonstige (DE-588)1044944110 oth INTRUST 5. 2013 Graz Sonstige (DE-588)1044944927 oth Lecture notes in computer science 8292 (DE-604)BV014880109 8292 https://doi.org/10.1007/978-3-319-03491-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027032621&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027032621&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Trusted systems 5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings Lecture notes in computer science Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)7562931-8 (DE-588)1071861417 |
title | Trusted systems 5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings |
title_auth | Trusted systems 5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings |
title_exact_search | Trusted systems 5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings |
title_full | Trusted systems 5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings Roderick Bloem ... (eds.) |
title_fullStr | Trusted systems 5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings Roderick Bloem ... (eds.) |
title_full_unstemmed | Trusted systems 5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings Roderick Bloem ... (eds.) |
title_short | Trusted systems |
title_sort | trusted systems 5th international conference intrust 2013 graz austria december 4 5 2013 proceedings |
title_sub | 5th international conference, INTRUST 2013, Graz, Austria, December 4 - 5, 2013 ; proceedings |
topic | Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Trusted Computing Konferenzschrift 2013 Graz |
url | https://doi.org/10.1007/978-3-319-03491-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027032621&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027032621&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT bloemroderick trustedsystems5thinternationalconferenceintrust2013grazaustriadecember452013proceedings AT intrustgraz trustedsystems5thinternationalconferenceintrust2013grazaustriadecember452013proceedings |