9783642309205-3642309208-Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Lecture Notes in Computer Science, 7344)

Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Lecture Notes in Computer Science, 7344)

ISBN-13: 9783642309205
ISBN-10: 3642309208
Edition: 2012
Author: Melanie Volkamer, Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Mike Reiter, Xinwen Zhang
Publication date: 2012
Publisher: Springer
Format: Paperback 353 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783642309205
ISBN-10: 3642309208
Edition: 2012
Author: Melanie Volkamer, Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Mike Reiter, Xinwen Zhang
Publication date: 2012
Publisher: Springer
Format: Paperback 353 pages

Summary

Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Lecture Notes in Computer Science, 7344) (ISBN-13: 9783642309205 and ISBN-10: 3642309208), written by authors Melanie Volkamer, Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Mike Reiter, Xinwen Zhang, was published by Springer in 2012. With an overall rating of 3.7 stars, it's a notable title among other books. You can easily purchase or rent Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Lecture Notes in Computer Science, 7344) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, Trust 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book