LEADER 04309nam 22008295 450 001 996465383603316 005 20200706154521.0 010 $a3-642-21599-8 024 7 $a10.1007/978-3-642-21599-5 035 $a(CKB)2670000000095877 035 $a(SSID)ssj0000530681 035 $a(PQKBManifestationID)11300496 035 $a(PQKBTitleCode)TC0000530681 035 $a(PQKBWorkID)10569109 035 $a(PQKB)10965614 035 $a(DE-He213)978-3-642-21599-5 035 $a(MiAaPQ)EBC3066806 035 $a(PPN)153869232 035 $a(EXLCZ)992670000000095877 100 $a20110614d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust and Trustworthy Computing$b[electronic resource] $e4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings /$fedited by Jonathan McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, Angela Sasse, Yolanta Beres 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (VII, 314 p. 77 illus., 49 illus. in color.) 225 1 $aSecurity and Cryptology ;$v6740 300 $aProceedings from the Fourth International Conference on Trust and Trustworthy Computing. 311 $a3-642-21598-X 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011. The 23 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in technical sessions on cloud and virtualization, physically unclonable functions, mobile device security, socio-economic aspects of trust, hardware trust, access control, privacy, trust aspects of routing, and cryptophysical protocols. 410 0$aSecurity and Cryptology ;$v6740 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputers and civilization 606 $aApplication software 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 0$aApplication software. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputers and Society. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aMcCune$b Jonathan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBalacheff$b Boris$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPerrig$b Adrian$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSadeghi$b Ahmad-Reza$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSasse$b Angela$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBeres$b Yolanta$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465383603316 996 $aTrust and Trustworthy Computing$92829757 997 $aUNISA