LEADER 03660nam 22007695 450 001 996199993503316 005 20200629212115.0 010 $a3-319-08593-X 024 7 $a10.1007/978-3-319-08593-7 035 $a(CKB)3710000000143889 035 $a(SSID)ssj0001278195 035 $a(PQKBManifestationID)11840656 035 $a(PQKBTitleCode)TC0001278195 035 $a(PQKBWorkID)11279831 035 $a(PQKB)11491159 035 $a(DE-He213)978-3-319-08593-7 035 $a(MiAaPQ)EBC3093304 035 $a(PPN)179766600 035 $a(EXLCZ)993710000000143889 100 $a20140623d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust and Trustworthy Computing$b[electronic resource] $e7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings /$fedited by Thorsten Holz, Sotiris Ioannidis 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 226 p. 67 illus.) 225 1 $aSecurity and Cryptology ;$v8564 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-08592-1 327 $aTPM 2.0 -- Trust in embedded and mobile systems -- Physical unclonable functions -- Trust in the web -- Trust and trustworthiness. 330 $aThis book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness. 410 0$aSecurity and Cryptology ;$v8564 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputers 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aComputers. 615 14$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aInformation Systems and Communication Service. 676 $a005.8 702 $aHolz$b Thorsten$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIoannidis$b Sotiris$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996199993503316 996 $aTrust and Trustworthy Computing$92829757 997 $aUNISA