03635nam 22007695 450 991048323560332120200629212115.03-319-08593-X10.1007/978-3-319-08593-7(CKB)3710000000143889(SSID)ssj0001278195(PQKBManifestationID)11840656(PQKBTitleCode)TC0001278195(PQKBWorkID)11279831(PQKB)11491159(DE-He213)978-3-319-08593-7(MiAaPQ)EBC3093304(PPN)179766600(EXLCZ)99371000000014388920140623d2014 u| 0engurnn|008mamaatxtccrTrust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings /edited by Thorsten Holz, Sotiris Ioannidis1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XII, 226 p. 67 illus.) Security and Cryptology ;8564Bibliographic Level Mode of Issuance: Monograph3-319-08592-1 TPM 2.0 -- Trust in embedded and mobile systems -- Physical unclonable functions -- Trust in the web -- Trust and trustworthiness.This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.Security and Cryptology ;8564Computer securityManagement information systemsComputer scienceData encryption (Computer science)Computers and civilizationComputersSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Information Systems and Communication Servicehttps://scigraph.springernature.com/ontologies/product-market-codes/I18008Computer security.Management information systems.Computer science.Data encryption (Computer science).Computers and civilization.Computers.Systems and Data Security.Management of Computing and Information Systems.Cryptology.Computers and Society.Information Systems and Communication Service.005.8Holz Thorstenedthttp://id.loc.gov/vocabulary/relators/edtIoannidis Sotirisedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483235603321Trust and Trustworthy Computing2829757UNINA