Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers /
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers,...
Corporate Author: | SpringerLink (Online service) |
---|---|
Other Authors: | Yung, Moti (Editor), Zhu, Liehuang (Editor), Yang, Yanjiang (Editor) |
Format: | Electronic eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
Edition: | 1st ed. 2015. |
Series: | Lecture Notes in Computer Science,
9473 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Similar Items
-
Trusted Systems Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers /
Published: (2011) -
Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings /
Published: (2017) -
Trusted Systems Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers /
Published: (2012) -
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers /
Published: (2011) -
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers /
Published: (2012)