|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-31550-8 |
003 |
DE-He213 |
005 |
20220115065919.0 |
007 |
cr nn 008mamaa |
008 |
160322s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319315508
|9 978-3-319-31550-8
|
024 |
7 |
|
|a 10.1007/978-3-319-31550-8
|2 doi
|
050 |
|
4 |
|a QA76.9.M35
|
050 |
|
4 |
|a QA297.4
|
072 |
|
7 |
|a UYAM
|2 bicssc
|
072 |
|
7 |
|a PBD
|2 bicssc
|
072 |
|
7 |
|a COM018000
|2 bisacsh
|
072 |
|
7 |
|a UYAM
|2 thema
|
072 |
|
7 |
|a PBD
|2 thema
|
082 |
0 |
4 |
|a 004.0151
|2 23
|
245 |
1 |
0 |
|a Trusted Systems
|h [electronic resource] :
|b 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers /
|c edited by Moti Yung, Jianbiao Zhang, Zhen Yang.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XII, 235 p. 55 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9565
|
505 |
0 |
|
|a Aspects of trusted computing systems -- Trusted modules -- Platforms -- Networks, services and applications -- Encryptions and signatures -- Security model -- Trusted technologies -- Software and system security.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have been carefully reviewed and selected from 29 submissions. They are devoted to all aspects of trusted computing systems, including trusted modules, platforms; networks, services and applications. The papers are organized in the following sections: encryptions and signatures; security model; trusted technologies; software and system security.
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
|
0 |
|a Discrete mathematics.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Machine theory.
|
650 |
|
0 |
|a Artificial intelligence-Data processing.
|
650 |
|
0 |
|a Bioinformatics.
|
650 |
1 |
4 |
|a Discrete Mathematics in Computer Science.
|
650 |
2 |
4 |
|a Discrete Mathematics.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Formal Languages and Automata Theory.
|
650 |
2 |
4 |
|a Data Science.
|
650 |
2 |
4 |
|a Computational and Systems Biology.
|
700 |
1 |
|
|a Yung, Moti.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Zhang, Jianbiao.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Yang, Zhen.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319315492
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319315515
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9565
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-31550-8
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|