Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings / [electronic resource] :
edited by Mauro Conti, Matthias Schunter, Ioannis Askoxylakis.
- 1st ed. 2015.
- XI, 328 p. 79 illus. online resource.
- Security and Cryptology, 9229 2946-1863 ; .
- Security and Cryptology, 9229 .
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.
9783319228464
10.1007/978-3-319-22846-4 doi
Data protection.
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Computer networks .
Data and Information Security.
IT Operations.
Cryptology.
Computers and Society.
Computer Communication Networks.
QA76.9.A25
005.8
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.
9783319228464
10.1007/978-3-319-22846-4 doi
Data protection.
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Computer networks .
Data and Information Security.
IT Operations.
Cryptology.
Computers and Society.
Computer Communication Networks.
QA76.9.A25
005.8