40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
20 °P sammeln
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
20 °P sammeln
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
20 °P sammeln
Jetzt verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
20 °P sammeln
  • Format: PDF

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 14.25MB
Produktbeschreibung
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Prof. Dr. techn. Stefan Katzenbeisser, Dipl. Informatiker, Diplom an der TU Wien (2001), Promotion an der TU München (2005), Senior Scientist, Philips Research Europe, Information and System Security Group (2005-2007), Juniorprofessor für Security Engineering (2007 - 2011), seit 2011 Universitätsprofessor für Security Engineering der TU Darmstadt, Forschungsschwerpunkte in Cryptographic protocols (design, analysis), Cryptographic techniques for noisy and fuzzy data, Privacy Enhancing, Technologies, Software Security, Watermarking, Digital Rights Management, Copyright Protection, Malicious Code Detection.