LEADER 04225nam 22008295 450 001 996465315103316 005 20200703082231.0 010 $a3-642-30921-6 024 7 $a10.1007/978-3-642-30921-2 035 $a(CKB)3400000000085318 035 $a(SSID)ssj0000697641 035 $a(PQKBManifestationID)11453813 035 $a(PQKBTitleCode)TC0000697641 035 $a(PQKBWorkID)10709507 035 $a(PQKB)10862317 035 $a(DE-He213)978-3-642-30921-2 035 $a(MiAaPQ)EBC3071051 035 $a(PPN)168318024 035 $a(EXLCZ)993400000000085318 100 $a20120608d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust and Trustworthy Computing$b[electronic resource] $e5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings /$fedited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XII, 341 p. 91 illus.) 225 1 $aSecurity and Cryptology ;$v7344 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-30920-8 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security. 410 0$aSecurity and Cryptology ;$v7344 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputers and civilization 606 $aApplication software 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 0$aApplication software. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputers and Society. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.82 702 $aKatzenbeisser$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWeippl$b Edgar$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCamp$b L. Jean$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVolkamer$b Melanie$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aReiter$b Mike$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Xinwen$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465315103316 996 $aTrust and Trustworthy Computing$92829757 997 $aUNISA