Eintrag weiter verarbeiten

Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings

Gespeichert in:

Personen und Körperschaften: Katzenbeisser, Stefan (VerfasserIn), Weippl, Edgar (Sonstige), Camp, L. Jean (Sonstige), Volkamer, Melanie (Sonstige), Reiter, Mike (Sonstige), Zhāng, Xīnwén (Sonstige)
Titel: Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings/ edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2012
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 7344
Schlagwörter:
Buchausg. u.d.T.: Trust and trustworthy computing, Berlin : Springer, 2012, XII, 339 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 05530cam a22011652 4500
001 0-1651538484
003 DE-627
005 20240122105101.0
007 cr uuu---uuuuu
008 120704s2012 gw |||||o 00| ||eng c
020 |a 9783642309212  |9 978-3-642-30921-2 
024 7 |a 10.1007/978-3-642-30921-2  |2 doi 
035 |a (DE-627)1651538484 
035 |a (DE-576)367686619 
035 |a (DE-599)BSZ367686619 
035 |a (OCoLC)840010229 
035 |a (OCoLC)874151957 
035 |a (DE-He213)978-3-642-30921-2 
035 |a (EBP)040542599 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE  |c XA-DE-BE 
050 0 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 bicssc 
084 |a SS 4800  |q SEPA  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a 54.38  |2 bkl 
100 1 |a Katzenbeisser, Stefan  |4 aut 
245 1 0 |a Trust and Trustworthy Computing  |b 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings  |c edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2012 
300 |a Online-Ressource (XII, 341p. 91 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7344 
490 0 |a SpringerLink  |a Bücher 
500 |a Literaturangaben 
520 |a This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security. 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Computer software 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Data encryption (Computer science) 
650 0 |a Computer software 
650 0 |a Information Systems 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
650 0 |a Computer networks . 
650 0 |a Electronic data processing 
650 0 |a Algorithms. 
650 0 |a Computers and civilization. 
650 0 |a Application software. 
655 7 |a Konferenzschrift  |y 2012  |z Wien  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)7562931-8  |0 (DE-627)526751819  |0 (DE-576)263014703  |a Trusted Computing  |2 gnd 
689 0 |5 DE-101 
700 1 |a Weippl, Edgar  |4 oth 
700 1 |a Camp, L. Jean  |0 (DE-627)1251269400  |0 (DE-576)181269406  |4 oth 
700 1 |a Volkamer, Melanie  |0 (DE-588)1027579027  |0 (DE-627)729427439  |0 (DE-576)189561645  |4 oth 
700 1 |a Reiter, Mike  |4 oth 
700 1 |a Zhāng, Xīnwén  |0 (DE-627)1332368999  |0 (DE-576)262368994  |4 oth 
776 1 |z 9783642309205 
776 0 8 |i Buchausg. u.d.T.  |t Trust and trustworthy computing  |d Berlin : Springer, 2012  |h XII, 339 S.  |w (DE-627)716883651  |w (DE-576)379833441  |z 3642309208  |z 9783642309205 
830 0 |a Lecture notes in computer science  |v 7344  |9 7344  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-30921-2  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-30921-2  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz367686619cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20140207104209  |3 Cover 
889 |w (DE-627)718776496 
912 |a ZDB-2-LNC  |b 2012 
912 |a ZDB-2-SCS  |b 2012 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SXCS  |b 2012 
912 |a ZDB-2-SEB  |b 2012 
935 |h GBV  |i ExPruef 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
951 |a BO 
900 |a Camp, L. J. 
900 |a Zhāng Xīnwén 
950 |a Informationstechnik 
950 |a Sicherheit 
950 |a Vertrauenswürdigkeit 
950 |a Datensicherung 
950 |a Computersicherheit 
950 |a Sealed Cloud 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-30921-2  |9 DE-14 
852 |a DE-14  |x epn:334999914X  |z 2012-07-04T16:23:26Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-30921-2  |9 DE-15 
852 |a DE-15  |x epn:3349999174  |z 2012-07-04T16:23:26Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-30921-2  |9 DE-Ch1 
852 |a DE-Ch1  |x epn:3349999220  |z 2012-07-04T16:23:26Z 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-30921-2  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |x epn:334999928X  |z 2012-07-04T16:23:26Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-30921-2  |9 DE-520 
852 |a DE-520  |x epn:3349999352  |z 2012-07-04T16:23:26Z 
980 |a 1651538484  |b 0  |k 1651538484  |o 367686619 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Trust+and+Trustworthy+Computing%3A+5th+International+Conference%2C+TRUST+2012%2C+Vienna%2C+Austria%2C+June+13-15%2C+2012.+Proceedings&rft.date=2012&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Trust+and+Trustworthy+Computing%3A+5th+International+Conference%2C+TRUST+2012%2C+Vienna%2C+Austria%2C+June+13-15%2C+2012.+Proceedings&rft.series=Lecture+notes+in+computer+science%2C+7344&rft.au=Katzenbeisser%2C+Stefan&rft.pub=Springer+Berlin+Heidelberg&rft.edition=&rft.isbn=3642309216
SOLR
_version_ 1792253792007225344
access_facet Electronic Resources
author Katzenbeisser, Stefan
author2 Weippl, Edgar, Camp, L. Jean, Volkamer, Melanie, Reiter, Mike, Zhāng, Xīnwén
author2_role oth, oth, oth, oth, oth
author2_variant e w ew, l j c lj ljc, m v mv, m r mr, x z xz
author_facet Katzenbeisser, Stefan, Weippl, Edgar, Camp, L. Jean, Volkamer, Melanie, Reiter, Mike, Zhāng, Xīnwén
author_role aut
author_sort Katzenbeisser, Stefan
author_variant s k sk
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
contents This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
ctrlnum (DE-627)1651538484, (DE-576)367686619, (DE-599)BSZ367686619, (OCoLC)840010229, (OCoLC)874151957, (DE-He213)978-3-642-30921-2, (EBP)040542599
de15_date 2012-07-04T16:23:26Z
dech1_date 2012-07-04T16:23:26Z
doi_str_mv 10.1007/978-3-642-30921-2
era_facet 2012
facet_912a ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Trusted Computing
finc_class_facet Informatik, Allgemeines, Mathematik
fincclass_txtF_mv science-computerscience
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2012 Wien (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Wien
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7344
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1651538484
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer Berlin Heidelberg, 2012
imprint_str_mv Berlin, Heidelberg: Springer Berlin Heidelberg, 2012
institution DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15
is_hierarchy_id 0-1651538484
is_hierarchy_title Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings
isbn 9783642309212
isbn_isn_mv 9783642309205, 3642309208
issn_isn_mv 1611-3349
kxp_id_str 1651538484
language English
last_indexed 2024-02-29T17:06:48.005Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Computer software, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Trusted Computing
marc024a_ct_mv 10.1007/978-3-642-30921-2
match_str katzenbeisser2012trustandtrustworthycomputing5thinternationalconferencetrust2012viennaaustriajune13152012proceedings
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)7344
names_id_str_mv (DE-627)1251269400, (DE-576)181269406, (DE-588)1027579027, (DE-627)729427439, (DE-576)189561645, (DE-627)1332368999, (DE-576)262368994
oclc_num 840010229, 874151957
physical Online-Ressource (XII, 341p. 91 illus, digital)
publishDate 2012
publishDateSort 2012
publishPlace Berlin, Heidelberg
publisher Springer Berlin Heidelberg
record_format marcfinc
record_id 367686619
recordtype marcfinc
rsn_id_str_mv (DE-15)3140136
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 7344
series2 Lecture Notes in Computer Science ; 7344, SpringerLink ; Bücher
source_id 0
spelling Katzenbeisser, Stefan aut, Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang, Berlin, Heidelberg Springer Berlin Heidelberg 2012, Online-Ressource (XII, 341p. 91 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7344, SpringerLink Bücher, Literaturangaben, This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security., Computer science, Computer Communication Networks, Computer software, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Konferenzschrift 2012 Wien (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)7562931-8 (DE-627)526751819 (DE-576)263014703 Trusted Computing gnd, DE-101, Weippl, Edgar oth, Camp, L. Jean (DE-627)1251269400 (DE-576)181269406 oth, Volkamer, Melanie (DE-588)1027579027 (DE-627)729427439 (DE-576)189561645 oth, Reiter, Mike oth, Zhāng, Xīnwén (DE-627)1332368999 (DE-576)262368994 oth, 9783642309205, Buchausg. u.d.T. Trust and trustworthy computing Berlin : Springer, 2012 XII, 339 S. (DE-627)716883651 (DE-576)379833441 3642309208 9783642309205, Lecture notes in computer science 7344 7344 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-30921-2 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-30921-2 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz367686619cov.jpg V:DE-576 X:springer image/jpeg 20140207104209 Cover, (DE-627)718776496, http://dx.doi.org/10.1007/978-3-642-30921-2 DE-14, DE-14 epn:334999914X 2012-07-04T16:23:26Z, http://dx.doi.org/10.1007/978-3-642-30921-2 DE-15, DE-15 epn:3349999174 2012-07-04T16:23:26Z, http://dx.doi.org/10.1007/978-3-642-30921-2 DE-Ch1, DE-Ch1 epn:3349999220 2012-07-04T16:23:26Z, http://dx.doi.org/10.1007/978-3-642-30921-2 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:334999928X 2012-07-04T16:23:26Z, http://dx.doi.org/10.1007/978-3-642-30921-2 DE-520, DE-520 epn:3349999352 2012-07-04T16:23:26Z
spellingShingle Katzenbeisser, Stefan, Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings, Lecture notes in computer science, 7344, This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security., Computer science, Computer Communication Networks, Computer software, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Konferenzschrift 2012 Wien, Trusted Computing
swb_id_str 367686619
title Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings
title_auth Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings
title_full Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang
title_fullStr Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang
title_full_unstemmed Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings edited by Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang
title_in_hierarchy 7344. Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings (2012)
title_short Trust and Trustworthy Computing
title_sort trust and trustworthy computing 5th international conference trust 2012 vienna austria june 13 15 2012 proceedings
title_sub 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings
title_unstemmed Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings
topic Computer science, Computer Communication Networks, Computer software, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Konferenzschrift 2012 Wien, Trusted Computing
topic_facet Computer science, Computer Communication Networks, Computer software, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Konferenzschrift, Trusted Computing
url https://doi.org/10.1007/978-3-642-30921-2, http://dx.doi.org/10.1007/978-3-642-30921-2, https://swbplus.bsz-bw.de/bsz367686619cov.jpg