LEADER 05121nam 22008655 450 001 9910484936803321 005 20200704111531.0 010 $a3-319-27998-X 024 7 $a10.1007/978-3-319-27998-5 035 $a(CKB)4340000000001263 035 $a(SSID)ssj0001616919 035 $a(PQKBManifestationID)16348798 035 $a(PQKBTitleCode)TC0001616919 035 $a(PQKBWorkID)14922357 035 $a(PQKB)10396805 035 $a(DE-He213)978-3-319-27998-5 035 $a(MiAaPQ)EBC6285313 035 $a(MiAaPQ)EBC5578238 035 $a(Au-PeEL)EBL5578238 035 $a(OCoLC)1066176930 035 $a(PPN)191705373 035 $a(EXLCZ)994340000000001263 100 $a20160129d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrusted Systems $e6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers /$fedited by Moti Yung, Liehuang Zhu, Yanjiang Yang 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XIII, 442 p. 83 illus. in color.) 225 1 $aSecurity and Cryptology ;$v9473 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-27997-1 327 $aSignature and authentication -- Secure protocols and access control -- Cloud security -- cryptographic aspects -- Software security -- Security analysis -- Secure communication and privacy. 330 $aNormal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}. 410 0$aSecurity and Cryptology ;$v9473 606 $aComputer security 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aComputer science?Mathematics 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer science?Mathematics. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aOperating Systems. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aDiscrete Mathematics in Computer Science. 676 $a511.3 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhu$b Liehuang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYang$b Yanjiang$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484936803321 996 $aTrusted Systems$92556477 997 $aUNINA