Amazon cover image
Image from Amazon.com

Trust and Trustworthy Computing [electronic resource] : 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings / edited by Mauro Conti, Matthias Schunter, Ioannis Askoxylakis.

Contributor(s): Material type: TextTextSeries: Security and Cryptology ; 9229 | Lecture Notes in Computer Science ; 9229Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015Description: XI, 328 p. 79 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319228464
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources: In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library IMSc Library Link to resource Available EBK15368

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India