Trusted Systems 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have been carefully reviewed and selected from 29 submissions. They are devot...

Full description

Bibliographic Details
Other Authors: Yung, Moti (Editor), Zhang, Jianbiao (Editor), Yang, Zhen (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2016, 2016
Edition:1st ed. 2016
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02255nmm a2200409 u 4500
001 EB001189734
003 EBX01000000000000000861871
005 00000000000000.0
007 cr|||||||||||||||||||||
008 160406 ||| eng
020 |a 9783319315508 
100 1 |a Yung, Moti  |e [editor] 
245 0 0 |a Trusted Systems  |h Elektronische Ressource  |b 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers  |c edited by Moti Yung, Jianbiao Zhang, Zhen Yang 
250 |a 1st ed. 2016 
260 |a Cham  |b Springer International Publishing  |c 2016, 2016 
300 |a XII, 235 p. 55 illus  |b online resource 
505 0 |a Aspects of trusted computing systems -- Trusted modules -- Platforms -- Networks, services and applications -- Encryptions and signatures -- Security model -- Trusted technologies -- Software and system security 
653 |a Artificial intelligence / Data processing 
653 |a Bioinformatics 
653 |a Computer science / Mathematics 
653 |a Computational and Systems Biology 
653 |a Discrete Mathematics in Computer Science 
653 |a Algorithms 
653 |a Formal Languages and Automata Theory 
653 |a Machine theory 
653 |a Discrete Mathematics 
653 |a Discrete mathematics 
653 |a Data Science 
700 1 |a Zhang, Jianbiao  |e [editor] 
700 1 |a Yang, Zhen  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-319-31550-8 
856 4 0 |u https://doi.org/10.1007/978-3-319-31550-8?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.0151 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have been carefully reviewed and selected from 29 submissions. They are devoted to all aspects of trusted computing systems, including trusted modules, platforms; networks, services and applications. The papers are organized in the following sections: encryptions and signatures; security model; trusted technologies; software and system security