LEADER 03036nam 22006375 450 001 9910484865703321 005 20251226202720.0 010 $a3-319-03491-X 024 7 $a10.1007/978-3-319-03491-1 035 $a(CKB)3710000000031244 035 $a(DE-He213)978-3-319-03491-1 035 $a(SSID)ssj0001068043 035 $a(PQKBManifestationID)11607108 035 $a(PQKBTitleCode)TC0001068043 035 $a(PQKBWorkID)11094669 035 $a(PQKB)10371803 035 $a(MiAaPQ)EBC3096868 035 $a(PPN)176107991 035 $a(EXLCZ)993710000000031244 100 $a20131125d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTrusted Systems $e5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings /$fedited by Roderick Bloem, Peter Lipp 205 $a1st ed. 2013. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 103 p. 18 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8292 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-03490-1 327 $aHardware-Based Security and Applications -- Para-Virtualizing the Trusted Platform Module: An Enterprise -- Framework Based on Version 2.0 Specification -- The PACE/CA Protocol for Machine Readable Travel Documents -- A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions -- Access Control, Integrity and Policy Enforcement. 330 $aThis book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8292 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aData and Information Security 606 $aCryptology 606 $aOperating Systems 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aOperating Systems. 676 $a005.8 702 $aBloem$b Roderick$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLipp$b Peter$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910484865703321 996 $aTrusted Systems$92556477 997 $aUNINA