|
|
|
|
LEADER |
05530cam a22011652 4500 |
001 |
0-1651538484 |
003 |
DE-627 |
005 |
20240122105101.0 |
007 |
cr uuu---uuuuu |
008 |
120704s2012 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642309212
|9 978-3-642-30921-2
|
024 |
7 |
|
|a 10.1007/978-3-642-30921-2
|2 doi
|
035 |
|
|
|a (DE-627)1651538484
|
035 |
|
|
|a (DE-576)367686619
|
035 |
|
|
|a (DE-599)BSZ367686619
|
035 |
|
|
|a (OCoLC)840010229
|
035 |
|
|
|a (OCoLC)874151957
|
035 |
|
|
|a (DE-He213)978-3-642-30921-2
|
035 |
|
|
|a (EBP)040542599
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Katzenbeisser, Stefan
|4 aut
|
245 |
1 |
0 |
|a Trust and Trustworthy Computing
|b 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings
|c edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2012
|
300 |
|
|
|a Online-Ressource (XII, 341p. 91 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7344
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Computer software
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Computer software
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Application software.
|
655 |
|
7 |
|a Konferenzschrift
|y 2012
|z Wien
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)7562931-8
|0 (DE-627)526751819
|0 (DE-576)263014703
|a Trusted Computing
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
700 |
1 |
|
|a Weippl, Edgar
|4 oth
|
700 |
1 |
|
|a Camp, L. Jean
|0 (DE-627)1251269400
|0 (DE-576)181269406
|4 oth
|
700 |
1 |
|
|a Volkamer, Melanie
|0 (DE-588)1027579027
|0 (DE-627)729427439
|0 (DE-576)189561645
|4 oth
|
700 |
1 |
|
|a Reiter, Mike
|4 oth
|
700 |
1 |
|
|a Zhāng, Xīnwén
|0 (DE-627)1332368999
|0 (DE-576)262368994
|4 oth
|
776 |
1 |
|
|z 9783642309205
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Trust and trustworthy computing
|d Berlin : Springer, 2012
|h XII, 339 S.
|w (DE-627)716883651
|w (DE-576)379833441
|z 3642309208
|z 9783642309205
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7344
|9 7344
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-30921-2
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-30921-2
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz367686619cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20140207104209
|3 Cover
|
889 |
|
|
|w (DE-627)718776496
|
912 |
|
|
|a ZDB-2-LNC
|b 2012
|
912 |
|
|
|a ZDB-2-SCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|b 2012
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
900 |
|
|
|a Camp, L. J.
|
900 |
|
|
|a Zhāng Xīnwén
|
950 |
|
|
|a Informationstechnik
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Vertrauenswürdigkeit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Sealed Cloud
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-30921-2
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:334999914X
|z 2012-07-04T16:23:26Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-30921-2
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3349999174
|z 2012-07-04T16:23:26Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-30921-2
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3349999220
|z 2012-07-04T16:23:26Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-30921-2
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:334999928X
|z 2012-07-04T16:23:26Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-30921-2
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3349999352
|z 2012-07-04T16:23:26Z
|
980 |
|
|
|a 1651538484
|b 0
|k 1651538484
|o 367686619
|
SOLR
_version_ |
1792253792007225344 |
access_facet |
Electronic Resources |
author |
Katzenbeisser, Stefan |
author2 |
Weippl, Edgar, Camp, L. Jean, Volkamer, Melanie, Reiter, Mike, Zhāng, Xīnwén |
author2_role |
oth, oth, oth, oth, oth |
author2_variant |
e w ew, l j c lj ljc, m v mv, m r mr, x z xz |
author_facet |
Katzenbeisser, Stefan, Weippl, Edgar, Camp, L. Jean, Volkamer, Melanie, Reiter, Mike, Zhāng, Xīnwén |
author_role |
aut |
author_sort |
Katzenbeisser, Stefan |
author_variant |
s k sk |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security. |
ctrlnum |
(DE-627)1651538484, (DE-576)367686619, (DE-599)BSZ367686619, (OCoLC)840010229, (OCoLC)874151957, (DE-He213)978-3-642-30921-2, (EBP)040542599 |
de15_date |
2012-07-04T16:23:26Z |
dech1_date |
2012-07-04T16:23:26Z |
doi_str_mv |
10.1007/978-3-642-30921-2 |
era_facet |
2012 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Trusted Computing |
finc_class_facet |
Informatik, Allgemeines, Mathematik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2012 Wien (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Wien |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7344 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1651538484 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer Berlin Heidelberg, 2012 |
imprint_str_mv |
Berlin, Heidelberg: Springer Berlin Heidelberg, 2012 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1651538484 |
is_hierarchy_title |
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings |
isbn |
9783642309212 |
isbn_isn_mv |
9783642309205, 3642309208 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1651538484 |
language |
English |
last_indexed |
2024-02-29T17:06:48.005Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Computer software, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Trusted Computing |
marc024a_ct_mv |
10.1007/978-3-642-30921-2 |
match_str |
katzenbeisser2012trustandtrustworthycomputing5thinternationalconferencetrust2012viennaaustriajune13152012proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7344 |
names_id_str_mv |
(DE-627)1251269400, (DE-576)181269406, (DE-588)1027579027, (DE-627)729427439, (DE-576)189561645, (DE-627)1332368999, (DE-576)262368994 |
oclc_num |
840010229, 874151957 |
physical |
Online-Ressource (XII, 341p. 91 illus, digital) |
publishDate |
2012 |
publishDateSort |
2012 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer Berlin Heidelberg |
record_format |
marcfinc |
record_id |
367686619 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3140136 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7344 |
series2 |
Lecture Notes in Computer Science ; 7344, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Katzenbeisser, Stefan aut, Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang, Berlin, Heidelberg Springer Berlin Heidelberg 2012, Online-Ressource (XII, 341p. 91 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7344, SpringerLink Bücher, Literaturangaben, This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security., Computer science, Computer Communication Networks, Computer software, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Konferenzschrift 2012 Wien (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)7562931-8 (DE-627)526751819 (DE-576)263014703 Trusted Computing gnd, DE-101, Weippl, Edgar oth, Camp, L. Jean (DE-627)1251269400 (DE-576)181269406 oth, Volkamer, Melanie (DE-588)1027579027 (DE-627)729427439 (DE-576)189561645 oth, Reiter, Mike oth, Zhāng, Xīnwén (DE-627)1332368999 (DE-576)262368994 oth, 9783642309205, Buchausg. u.d.T. Trust and trustworthy computing Berlin : Springer, 2012 XII, 339 S. (DE-627)716883651 (DE-576)379833441 3642309208 9783642309205, Lecture notes in computer science 7344 7344 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-30921-2 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-30921-2 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz367686619cov.jpg V:DE-576 X:springer image/jpeg 20140207104209 Cover, (DE-627)718776496, http://dx.doi.org/10.1007/978-3-642-30921-2 DE-14, DE-14 epn:334999914X 2012-07-04T16:23:26Z, http://dx.doi.org/10.1007/978-3-642-30921-2 DE-15, DE-15 epn:3349999174 2012-07-04T16:23:26Z, http://dx.doi.org/10.1007/978-3-642-30921-2 DE-Ch1, DE-Ch1 epn:3349999220 2012-07-04T16:23:26Z, http://dx.doi.org/10.1007/978-3-642-30921-2 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:334999928X 2012-07-04T16:23:26Z, http://dx.doi.org/10.1007/978-3-642-30921-2 DE-520, DE-520 epn:3349999352 2012-07-04T16:23:26Z |
spellingShingle |
Katzenbeisser, Stefan, Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings, Lecture notes in computer science, 7344, This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security., Computer science, Computer Communication Networks, Computer software, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Konferenzschrift 2012 Wien, Trusted Computing |
swb_id_str |
367686619 |
title |
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings |
title_auth |
Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings |
title_full |
Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang |
title_fullStr |
Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang |
title_full_unstemmed |
Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang |
title_in_hierarchy |
7344. Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings (2012) |
title_short |
Trust and Trustworthy Computing |
title_sort |
trust and trustworthy computing 5th international conference trust 2012 vienna austria june 13 15 2012 proceedings |
title_sub |
5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings |
title_unstemmed |
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings |
topic |
Computer science, Computer Communication Networks, Computer software, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Konferenzschrift 2012 Wien, Trusted Computing |
topic_facet |
Computer science, Computer Communication Networks, Computer software, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Konferenzschrift, Trusted Computing |
url |
https://doi.org/10.1007/978-3-642-30921-2, http://dx.doi.org/10.1007/978-3-642-30921-2, https://swbplus.bsz-bw.de/bsz367686619cov.jpg |