000 03917nam a22006375i 4500
001 978-3-319-45572-3
003 DE-He213
005 20210120143353.0
007 cr nn 008mamaa
008 160820s2016 gw | s |||| 0|eng d
020 _a9783319455723
_9978-3-319-45572-3
024 7 _a10.1007/978-3-319-45572-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aTrust and Trustworthy Computing
_h[electronic resource] :
_b9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings /
_cedited by Michael Franz, Panos Papadimitratos.
250 _a1st ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aIX, 159 p. 51 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology ;
_v9824
_aLecture Notes in Computer Science
_v9824
505 0 _aAnonymous Attestation Using the Strong Diffe Hellman Assumption Revisited -- Practical Signing-Right Revocation -- Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness -- Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices -- Controversy in trust networks -- Enabling Key Migration Between Non-Compatible TPM Versions -- Bundling Evidence for Layered Attestation -- An arbiter PUF secured by remote random reconfigurations of an FPGA. .
520 _aThis book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016. The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs.
650 0 _aComputer security.
650 0 _aManagement information systems.
650 0 _aComputer science.
650 0 _aData encryption (Computer science).
650 0 _aComputers and civilization.
650 0 _aComputers.
650 1 4 _aSystems and Data Security.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28060
650 2 4 _aManagement of Computing and Information Systems.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I24067
650 2 4 _aCryptology.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28020
650 2 4 _aComputers and Society.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I24040
650 2 4 _aInformation Systems and Communication Service.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I18008
700 1 _aFranz, Michael.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPapadimitratos, Panos.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319455716
776 0 8 _iPrinted edition:
_z9783319455730
830 0 _aSecurity and Cryptology ;
_v9824
830 0 _aLecture Notes in Computer Science ;
_v9824
856 4 0 _uhttps://doi.org/10.1007/978-3-319-45572-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cEBK
999 _c57904
_d57904