|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-25283-9 |
003 |
DE-He213 |
005 |
20230412075208.0 |
007 |
cr nn 008mamaa |
008 |
111117s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642252839
|9 978-3-642-25283-9
|
024 |
7 |
|
|a 10.1007/978-3-642-25283-9
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Trusted Systems
|h [electronic resource] :
|b Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers /
|c edited by Liqun Chen, Moti Yung.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a XIV, 362 p. 73 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 6802
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2010, held in Beijing, China, in December 2010. The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Data and Information Security.
|
700 |
1 |
|
|a Chen, Liqun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Yung, Moti.
|e editor.
|0 (orcid)0000-0003-0848-0873
|1 https://orcid.org/0000-0003-0848-0873
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642252846
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642252822
|
830 |
|
0 |
|a Security and Cryptology ;
|v 6802
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-25283-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|