000 | 03917nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-319-45572-3 | ||
003 | DE-He213 | ||
005 | 20210120143353.0 | ||
007 | cr nn 008mamaa | ||
008 | 160820s2016 gw | s |||| 0|eng d | ||
020 |
_a9783319455723 _9978-3-319-45572-3 |
||
024 | 7 |
_a10.1007/978-3-319-45572-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aTrust and Trustworthy Computing _h[electronic resource] : _b9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings / _cedited by Michael Franz, Panos Papadimitratos. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aIX, 159 p. 51 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology ; _v9824 _aLecture Notes in Computer Science _v9824 |
|
505 | 0 | _aAnonymous Attestation Using the Strong Diffe Hellman Assumption Revisited -- Practical Signing-Right Revocation -- Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness -- Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices -- Controversy in trust networks -- Enabling Key Migration Between Non-Compatible TPM Versions -- Bundling Evidence for Layered Attestation -- An arbiter PUF secured by remote random reconfigurations of an FPGA. . | |
520 | _aThis book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016. The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aManagement information systems. | |
650 | 0 | _aComputer science. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aComputers. | |
650 | 1 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 |
_aManagement of Computing and Information Systems. _0https://scigraph.springernature.com/ontologies/product-market-codes/I24067 |
650 | 2 | 4 |
_aCryptology. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28020 |
650 | 2 | 4 |
_aComputers and Society. _0https://scigraph.springernature.com/ontologies/product-market-codes/I24040 |
650 | 2 | 4 |
_aInformation Systems and Communication Service. _0https://scigraph.springernature.com/ontologies/product-market-codes/I18008 |
700 | 1 |
_aFranz, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPapadimitratos, Panos. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319455716 |
776 | 0 | 8 |
_iPrinted edition: _z9783319455730 |
830 | 0 |
_aSecurity and Cryptology ; _v9824 |
|
830 | 0 |
_aLecture Notes in Computer Science ; _v9824 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-45572-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c57904 _d57904 |