Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4968)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): Trust: International Conference on Trust and Trustworthy Computing
Conference proceedings info: Trust 2008.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (14 papers)
-
Front Matter
-
TRUST 2008
-
Back Matter
About this book
Keywords
- Code
- Information
- Trusted Computing
- Trusted Platform Module
- anonymity
- architecture
- bilinear map
- embedded trusted computing
- identification
- man-in-the-middle
- mobile identity
- model driven security
- non-volatile memory
- privacy
- security
Bibliographic Information
Book Title: Trusted Computing - Challenges and Applications
Book Subtitle: First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings
Editors: Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-540-68979-9
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2008
eBook ISBN: 978-3-540-68979-9Published: 15 August 2008
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 191
Topics: Data and Information Security, Computer Communication Networks, Software Engineering, Cryptology, Computer and Information Systems Applications, User Interfaces and Human Computer Interaction