Normal
0
false
false
false
EN-US
X-NONE
X-NONE
This book constitutes the thoroughly refereed
post-conference proceedings of the 6th International Conference on Trusted
Systems, INTRUST 2014, held in Beijing, China, in December 2014.
The conference brings together academic and industrial
researchers, designers, and implementers with end-users of trusted systems, in
order to foster the exchange of ideas in this challenging and fruitful area.
The revised full papers focus on the theory, technologies and applications of
trusted systems and cover all aspects of trusted computing systems, including
trusted modules, platforms, networks, services and applications, from their
fundamental features and functionalities to design principles, architecture and
implementation technologies.
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
Reihe
Auflage
Sprache
Verlagsort
Verlagsgruppe
Springer International Publishing
Illustrationen
83
83 farbige Abbildungen
XIII, 442 p. 83 illus. in color.
ISBN-13
978-3-319-27998-5 (9783319279985)
DOI
10.1007/978-3-319-27998-5
Schweitzer Klassifikation
Signature and authentication.- Secure protocols and access control.- Cloud security.- cryptographic aspects.- Software security.- Security analysis.- Secure communication and privacy.