![9783642309205-3642309208-Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Lecture Notes in Computer Science, 7344)](https://booksrun.com/image-loader/215/https:__m.media-amazon.com_images_I_41lVv9Y5zsL._SL500_.jpg)
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Lecture Notes in Computer Science, 7344)
ISBN-13:
9783642309205
ISBN-10:
3642309208
Edition:
2012
Author:
Melanie Volkamer, Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Mike Reiter, Xinwen Zhang
Publication date:
2012
Publisher:
Springer
Format:
Paperback
353 pages
FREE US shipping
Book details
ISBN-13:
9783642309205
ISBN-10:
3642309208
Edition:
2012
Author:
Melanie Volkamer, Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Mike Reiter, Xinwen Zhang
Publication date:
2012
Publisher:
Springer
Format:
Paperback
353 pages
Summary
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Lecture Notes in Computer Science, 7344) (ISBN-13: 9783642309205 and ISBN-10: 3642309208), written by authors
Melanie Volkamer, Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Mike Reiter, Xinwen Zhang, was published by Springer in 2012.
With an overall rating of 3.7 stars, it's a notable title among other
books. You can easily purchase or rent Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Lecture Notes in Computer Science, 7344) (Paperback) from BooksRun,
along with many other new and used
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, Trust 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}