LEADER 03202nam 22006135 450 001 996465392803316 005 20200703223808.0 010 $a3-319-03491-X 024 7 $a10.1007/978-3-319-03491-1 035 $a(CKB)3710000000031244 035 $a(DE-He213)978-3-319-03491-1 035 $a(SSID)ssj0001068043 035 $a(PQKBManifestationID)11607108 035 $a(PQKBTitleCode)TC0001068043 035 $a(PQKBWorkID)11094669 035 $a(PQKB)10371803 035 $a(MiAaPQ)EBC3096868 035 $a(PPN)176107991 035 $a(EXLCZ)993710000000031244 100 $a20131125d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTrusted Systems$b[electronic resource] $e5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings /$fedited by Roderick Bloem, Peter Lipp 205 $a1st ed. 2013. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 103 p. 18 illus.) 225 1 $aSecurity and Cryptology ;$v8292 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-03490-1 327 $aHardware-Based Security and Applications -- Para-Virtualizing the Trusted Platform Module: An Enterprise -- Framework Based on Version 2.0 Specification -- The PACE|CA Protocol for Machine Readable Travel Documents -- A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions -- Access Control, Integrity and Policy Enforcement. 330 $aThis book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. 410 0$aSecurity and Cryptology ;$v8292 606 $aComputer security 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aOperating Systems. 676 $a005.8 702 $aBloem$b Roderick$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLipp$b Peter$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465392803316 996 $aTrusted Systems$92556477 997 $aUNISA