Trusted systems: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
[Cham]
Springer
[2015]
|
Schriftenreihe: | Lecture Notes in Computer Science
9473 |
Schlagworte: | |
Online-Zugang: | TUM01 UBR01 Volltext Abstract Inhaltsverzeichnis |
Beschreibung: | 1 Online Ressource XIII, 442 Seiten Illustrationen, Diagramme |
ISBN: | 9783319279985 9783319279978 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-27998-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043408646 | ||
003 | DE-604 | ||
005 | 20200514 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 160225s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319279985 |c Online |9 978-3-319-27998-5 | ||
020 | |a 9783319279978 |c Print |9 978-3-319-27997-8 | ||
024 | 7 | |a 10.1007/978-3-319-27998-5 |2 doi | |
035 | |a (OCoLC)936875235 | ||
035 | |a (DE-599)BVBBV043408646 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-861 |a DE-860 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
245 | 1 | 0 | |a Trusted systems |b 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers |c edited by Moti Yung, Liehuang Zhu, Yanjiang Yang |
264 | 1 | |a [Cham] |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online Ressource XIII, 442 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v Volume 9473 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer science / Mathematics | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Operating Systems | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Discrete Mathematics in Computer Science | |
650 | 4 | |a Informatik | |
650 | 4 | |a Mathematik | |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Yung, Moti |4 edt | |
711 | 2 | |a INTRUST |n 6. |d 2014 |c Beijing |j Sonstige |0 (DE-588)1083285300 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9473 |w (DE-604)BV014880109 |9 9473 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-27998-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028826993 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-27998-5 |l TUM01 |p ZDB-2-LNC |q ZDB-2-LNC_2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-27998-5 |l UBR01 |p ZDB-2-SCS |q ZDB-2-LNC_2016 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175996923936768 |
---|---|
adam_text | TRUSTED SYSTEMS
/
: 2015
ABSTRACT / INHALTSTEXT
NORMAL 0 FALSE FALSE FALSE EN-US X-NONE X-NONE THIS BOOK CONSTITUTES THE
THOROUGHLY REFEREED POST-CONFERENCE PROCEEDINGS OF THE 6TH INTERNATIONAL
CONFERENCE ON TRUSTED SYSTEMS, INTRUST 2014, HELD IN BEIJING, CHINA, IN
DECEMBER 2014. THE CONFERENCE BRINGS TOGETHER ACADEMIC AND INDUSTRIAL
RESEARCHERS, DESIGNERS, AND IMPLEMENTERS WITH END-USERS OF TRUSTED
SYSTEMS, IN ORDER TO FOSTER THE EXCHANGE OF IDEAS IN THIS CHALLENGING
AND FRUITFUL AREA. THE REVISED FULL PAPERS FOCUS ON THE THEORY,
TECHNOLOGIES AND APPLICATIONS OF TRUSTED SYSTEMS AND COVER ALL ASPECTS
OF TRUSTED COMPUTING SYSTEMS, INCLUDING TRUSTED MODULES, PLATFORMS,
NETWORKS, SERVICES AND APPLICATIONS, FROM THEIR FUNDAMENTAL FEATURES AND
FUNCTIONALITIES TO DESIGN PRINCIPLES, ARCHITECTURE AND IMPLEMENTATION
TECHNOLOGIES. /* STYLE DEFINITIONS */ TABLE.MSONORMALTABLE
{MSO-STYLE-NAME: TABLE NORMAL ; MSO-TSTYLE-ROWBAND-SIZE:0;
MSO-TSTYLE-COLBAND-SIZE:0; MSO-STYLE-NOSHOW:YES; MSO-STYLE-PRIORITY:99;
MSO-STYLE-QFORMAT:YES; MSO-STYLE-PARENT: ; MSO-PADDING-ALT:0IN 5.4PT
0IN 5.4PT; MSO-PARA-MARGIN:0IN; MSO-PARA-MARGIN-BOTTOM:.0001PT;
MSO-PAGINATION:WIDOW-ORPHAN; FONT-SIZE:11.0PT;
FONT-FAMILY: CALIBRI , SANS-SERIF ; MSO-ASCII-FONT-FAMILY:CALIBRI;
MSO-ASCII-THEME-FONT:MINOR-LATIN; MSO-FAREAST-FONT-FAMILY: TIMES NEW
ROMAN ; MSO-FAREAST-THEME-FONT:MINOR-FAREAST;
MSO-HANSI-FONT-FAMILY:CALIBRI; MSO-HANSI-THEME-FONT:MINOR-LATIN;
MSO-BIDI-FONT-FAMILY: TIMES NEW ROMAN ; MSO-BIDI-THEME-FONT:MINOR-BIDI;}
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
TRUSTED SYSTEMS
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SIGNATURE AND AUTHENTICATION
SECURE PROTOCOLS AND ACCESS CONTROL
CLOUD SECURITY
CRYPTOGRAPHIC ASPECTS
SOFTWARE SECURITY
SECURITY ANALYSIS
SECURE COMMUNICATION AND PRIVACY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Yung, Moti |
author2_role | edt |
author2_variant | m y my |
author_facet | Yung, Moti |
building | Verbundindex |
bvnumber | BV043408646 |
classification_tum | DAT 000 DAT 050f DAT 465f DAT 460f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)936875235 (DE-599)BVBBV043408646 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-27998-5 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03324nmm a2200721zcb4500</leader><controlfield tag="001">BV043408646</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200514 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160225s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319279985</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-27998-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319279978</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-27997-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-27998-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)936875235</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043408646</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted systems</subfield><subfield code="b">6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers</subfield><subfield code="c">edited by Moti Yung, Liehuang Zhu, Yanjiang Yang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource XIII, 442 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">Volume 9473</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Discrete Mathematics in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yung, Moti</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">INTRUST</subfield><subfield code="n">6.</subfield><subfield code="d">2014</subfield><subfield code="c">Beijing</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1083285300</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9473</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9473</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-27998-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028826993</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-27998-5</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-27998-5</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043408646 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:25:10Z |
institution | BVB |
institution_GND | (DE-588)1083285300 |
isbn | 9783319279985 9783319279978 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028826993 |
oclc_num | 936875235 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-861 DE-860 |
owner_facet | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-861 DE-860 |
physical | 1 Online Ressource XIII, 442 Seiten Illustrationen, Diagramme |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC ZDB-2-LNC_2016 ZDB-2-SCS ZDB-2-LNC_2016 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture notes in computer science |
spelling | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers edited by Moti Yung, Liehuang Zhu, Yanjiang Yang [Cham] Springer [2015] © 2015 1 Online Ressource XIII, 442 Seiten Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science Volume 9473 0302-9743 Computer science Computer communication systems Operating systems (Computers) Computer security Data encryption (Computer science) Computer science / Mathematics Management information systems Computer Science Systems and Data Security Data Encryption Operating Systems Computer Communication Networks Management of Computing and Information Systems Discrete Mathematics in Computer Science Informatik Mathematik Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Trusted Computing (DE-588)7562931-8 s DE-604 Yung, Moti edt INTRUST 6. 2014 Beijing Sonstige (DE-588)1083285300 oth Lecture Notes in Computer Science 9473 (DE-604)BV014880109 9473 https://doi.org/10.1007/978-3-319-27998-5 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers Lecture Notes in Computer Science Computer science Computer communication systems Operating systems (Computers) Computer security Data encryption (Computer science) Computer science / Mathematics Management information systems Computer Science Systems and Data Security Data Encryption Operating Systems Computer Communication Networks Management of Computing and Information Systems Discrete Mathematics in Computer Science Informatik Mathematik Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)7562931-8 (DE-588)1071861417 |
title | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers |
title_auth | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers |
title_exact_search | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers |
title_full | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers edited by Moti Yung, Liehuang Zhu, Yanjiang Yang |
title_fullStr | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers edited by Moti Yung, Liehuang Zhu, Yanjiang Yang |
title_full_unstemmed | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers edited by Moti Yung, Liehuang Zhu, Yanjiang Yang |
title_short | Trusted systems |
title_sort | trusted systems 6th international conference intrust 2014 beijing china december 16 17 2014 revised selected papers |
title_sub | 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers |
topic | Computer science Computer communication systems Operating systems (Computers) Computer security Data encryption (Computer science) Computer science / Mathematics Management information systems Computer Science Systems and Data Security Data Encryption Operating Systems Computer Communication Networks Management of Computing and Information Systems Discrete Mathematics in Computer Science Informatik Mathematik Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Computer science Computer communication systems Operating systems (Computers) Computer security Data encryption (Computer science) Computer science / Mathematics Management information systems Computer Science Systems and Data Security Data Encryption Operating Systems Computer Communication Networks Management of Computing and Information Systems Discrete Mathematics in Computer Science Informatik Mathematik Trusted Computing Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-27998-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT yungmoti trustedsystems6thinternationalconferenceintrust2014beijingchinadecember16172014revisedselectedpapers AT intrustbeijing trustedsystems6thinternationalconferenceintrust2014beijingchinadecember16172014revisedselectedpapers |