Trusted systems: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers
Saved in:
Other Authors: | |
---|---|
Format: | Electronic Conference Proceedings eBook |
Language: | English |
Published: |
[Cham]
Springer
[2015]
|
Series: | Lecture Notes in Computer Science
9473 |
Subjects: | |
Links: | https://doi.org/10.1007/978-3-319-27998-5 https://doi.org/10.1007/978-3-319-27998-5 https://doi.org/10.1007/978-3-319-27998-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
Physical Description: | 1 Online Ressource XIII, 442 Seiten Illustrationen, Diagramme |
ISBN: | 9783319279985 9783319279978 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-27998-5 |
Staff View
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV043408646 | ||
003 | DE-604 | ||
005 | 20200514 | ||
007 | cr|uuu---uuuuu | ||
008 | 160225s2015 xx a||| o|||| 10||| eng d | ||
020 | |a 9783319279985 |c Online |9 978-3-319-27998-5 | ||
020 | |a 9783319279978 |c Print |9 978-3-319-27997-8 | ||
024 | 7 | |a 10.1007/978-3-319-27998-5 |2 doi | |
035 | |a (OCoLC)936875235 | ||
035 | |a (DE-599)BVBBV043408646 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-861 |a DE-860 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
245 | 1 | 0 | |a Trusted systems |b 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers |c edited by Moti Yung, Liehuang Zhu, Yanjiang Yang |
264 | 1 | |a [Cham] |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online Ressource XIII, 442 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v Volume 9473 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer science / Mathematics | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Operating Systems | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Discrete Mathematics in Computer Science | |
650 | 4 | |a Informatik | |
650 | 4 | |a Mathematik | |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Yung, Moti |4 edt | |
711 | 2 | |a INTRUST |n 6. |d 2014 |c Beijing |j Sonstige |0 (DE-588)1083285300 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9473 |w (DE-604)BV014880109 |9 9473 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-27998-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028826993 | |
966 | e | |u https://doi.org/10.1007/978-3-319-27998-5 |l DE-91 |p ZDB-2-LNC |q ZDB-2-LNC_2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-27998-5 |l DE-355 |p ZDB-2-SCS |q ZDB-2-LNC_2016 |x Verlag |3 Volltext |
Record in the Search Index
DE-BY-TUM_katkey | 2186072 |
---|---|
_version_ | 1821935398197133312 |
adam_text | TRUSTED SYSTEMS
/
: 2015
ABSTRACT / INHALTSTEXT
NORMAL 0 FALSE FALSE FALSE EN-US X-NONE X-NONE THIS BOOK CONSTITUTES THE
THOROUGHLY REFEREED POST-CONFERENCE PROCEEDINGS OF THE 6TH INTERNATIONAL
CONFERENCE ON TRUSTED SYSTEMS, INTRUST 2014, HELD IN BEIJING, CHINA, IN
DECEMBER 2014. THE CONFERENCE BRINGS TOGETHER ACADEMIC AND INDUSTRIAL
RESEARCHERS, DESIGNERS, AND IMPLEMENTERS WITH END-USERS OF TRUSTED
SYSTEMS, IN ORDER TO FOSTER THE EXCHANGE OF IDEAS IN THIS CHALLENGING
AND FRUITFUL AREA. THE REVISED FULL PAPERS FOCUS ON THE THEORY,
TECHNOLOGIES AND APPLICATIONS OF TRUSTED SYSTEMS AND COVER ALL ASPECTS
OF TRUSTED COMPUTING SYSTEMS, INCLUDING TRUSTED MODULES, PLATFORMS,
NETWORKS, SERVICES AND APPLICATIONS, FROM THEIR FUNDAMENTAL FEATURES AND
FUNCTIONALITIES TO DESIGN PRINCIPLES, ARCHITECTURE AND IMPLEMENTATION
TECHNOLOGIES. /* STYLE DEFINITIONS */ TABLE.MSONORMALTABLE
{MSO-STYLE-NAME: TABLE NORMAL ; MSO-TSTYLE-ROWBAND-SIZE:0;
MSO-TSTYLE-COLBAND-SIZE:0; MSO-STYLE-NOSHOW:YES; MSO-STYLE-PRIORITY:99;
MSO-STYLE-QFORMAT:YES; MSO-STYLE-PARENT: ; MSO-PADDING-ALT:0IN 5.4PT
0IN 5.4PT; MSO-PARA-MARGIN:0IN; MSO-PARA-MARGIN-BOTTOM:.0001PT;
MSO-PAGINATION:WIDOW-ORPHAN; FONT-SIZE:11.0PT;
FONT-FAMILY: CALIBRI , SANS-SERIF ; MSO-ASCII-FONT-FAMILY:CALIBRI;
MSO-ASCII-THEME-FONT:MINOR-LATIN; MSO-FAREAST-FONT-FAMILY: TIMES NEW
ROMAN ; MSO-FAREAST-THEME-FONT:MINOR-FAREAST;
MSO-HANSI-FONT-FAMILY:CALIBRI; MSO-HANSI-THEME-FONT:MINOR-LATIN;
MSO-BIDI-FONT-FAMILY: TIMES NEW ROMAN ; MSO-BIDI-THEME-FONT:MINOR-BIDI;}
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
TRUSTED SYSTEMS
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SIGNATURE AND AUTHENTICATION
SECURE PROTOCOLS AND ACCESS CONTROL
CLOUD SECURITY
CRYPTOGRAPHIC ASPECTS
SOFTWARE SECURITY
SECURITY ANALYSIS
SECURE COMMUNICATION AND PRIVACY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Yung, Moti |
author2_role | edt |
author2_variant | m y my |
author_facet | Yung, Moti |
building | Verbundindex |
bvnumber | BV043408646 |
classification_tum | DAT 000 DAT 050f DAT 465f DAT 460f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)936875235 (DE-599)BVBBV043408646 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-27998-5 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03309nam a2200721zcb4500</leader><controlfield tag="001">BV043408646</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200514 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160225s2015 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319279985</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-27998-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319279978</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-27997-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-27998-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)936875235</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043408646</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted systems</subfield><subfield code="b">6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers</subfield><subfield code="c">edited by Moti Yung, Liehuang Zhu, Yanjiang Yang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource XIII, 442 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">Volume 9473</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Discrete Mathematics in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yung, Moti</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">INTRUST</subfield><subfield code="n">6.</subfield><subfield code="d">2014</subfield><subfield code="c">Beijing</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1083285300</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9473</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9473</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-27998-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028826993</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-27998-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-27998-5</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043408646 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:35:41Z |
institution | BVB |
institution_GND | (DE-588)1083285300 |
isbn | 9783319279985 9783319279978 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028826993 |
oclc_num | 936875235 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-861 DE-860 |
owner_facet | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-861 DE-860 |
physical | 1 Online Ressource XIII, 442 Seiten Illustrationen, Diagramme |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC ZDB-2-LNC_2016 ZDB-2-SCS ZDB-2-LNC_2016 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture notes in computer science |
spellingShingle | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers Lecture Notes in Computer Science Computer science Computer communication systems Operating systems (Computers) Computer security Data encryption (Computer science) Computer science / Mathematics Management information systems Computer Science Systems and Data Security Data Encryption Operating Systems Computer Communication Networks Management of Computing and Information Systems Discrete Mathematics in Computer Science Informatik Mathematik Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)7562931-8 (DE-588)1071861417 |
title | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers |
title_auth | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers |
title_exact_search | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers |
title_full | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers edited by Moti Yung, Liehuang Zhu, Yanjiang Yang |
title_fullStr | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers edited by Moti Yung, Liehuang Zhu, Yanjiang Yang |
title_full_unstemmed | Trusted systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers edited by Moti Yung, Liehuang Zhu, Yanjiang Yang |
title_short | Trusted systems |
title_sort | trusted systems 6th international conference intrust 2014 beijing china december 16 17 2014 revised selected papers |
title_sub | 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers |
topic | Computer science Computer communication systems Operating systems (Computers) Computer security Data encryption (Computer science) Computer science / Mathematics Management information systems Computer Science Systems and Data Security Data Encryption Operating Systems Computer Communication Networks Management of Computing and Information Systems Discrete Mathematics in Computer Science Informatik Mathematik Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Computer science Computer communication systems Operating systems (Computers) Computer security Data encryption (Computer science) Computer science / Mathematics Management information systems Computer Science Systems and Data Security Data Encryption Operating Systems Computer Communication Networks Management of Computing and Information Systems Discrete Mathematics in Computer Science Informatik Mathematik Trusted Computing Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-27998-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826993&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT yungmoti trustedsystems6thinternationalconferenceintrust2014beijingchinadecember16172014revisedselectedpapers AT intrustbeijing trustedsystems6thinternationalconferenceintrust2014beijingchinadecember16172014revisedselectedpapers |