Amazon cover image
Image from Amazon.com

Trust and Trustworthy Computing [electronic resource] : 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 – July 2, 2014. Proceedings / edited by Thorsten Holz, Sotiris Ioannidis.

By: Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 8564Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014Description: XII, 226 p. 67 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319085937
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
TPM 2.0 -- Trust in embedded and mobile systems -- Physical unclonable functions -- Trust in the web -- Trust and trustworthiness.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
E-Book E-Book Central Library Available E-41909

TPM 2.0 -- Trust in embedded and mobile systems -- Physical unclonable functions -- Trust in the web -- Trust and trustworthiness.

This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.

There are no comments on this title.

to post a comment.

Maintained by VTU Library