Trust and trustworthy computing : 7th International Conference, Trust 2014, Heraklion, Crete, Greece, June 30-July 2, 2014 : proceedings / Thorsten Holz, Sotiris Ioannidis (Eds.).Material type: TextSeries: Serienbezeichnung | Lecture notes in computer science ; 8564. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham : Springer, Copyright date: ©2014Description: 1 online resource : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783319085937; 331908593XOther title: Trust 2014Subject(s): Computer security -- Congresses | Data encryption (Computer science) -- Congresses | Computer networks -- Security measures -- Congresses | Computer networks -- Security measures | Computer security | Data encryption (Computer science) | computerwetenschappen | computer sciences | informatiesystemen | information systems | communicatie | communication | computers | samenleving | society | gegevensbeheer | data management | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Electronic books. | Ebook. | Conference papers and proceedings. Additional physical formats: Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access online
|Item type||Current library||Collection||Call number||Status||Date due||Barcode||Item holds|
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed July 8, 2014).
TPM 2.0 -- Trust in embedded and mobile systems -- Physical unclonable functions -- Trust in the web -- Trust and trustworthiness.
This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.