Home > Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers
Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers
Book Informaton
Access Options
Citation Options
Download CitationShowing 1 to 20 of 23 entries
Chapters/Headings | Author(s) | Pages | Info |
1-15 | |||
16-31 | |||
32-47 | |||
48-65 | |||
66-83 | |||
84-101 | |||
102-112 | |||
113-128 | |||
129-137 | |||
138-155 | |||
156-167 | |||
168-183 | |||
184-203 | |||
204-220 | |||
221-238 | |||
239-257 | |||
258-270 | |||
271-288 | |||
289-303 | |||
Chapters/Headings | Author(s) | Pages | Info |
Showing 1 to 20 of 23 entries
Topics
Information systems Systems and Data Security Computers and Society Computer networks Data protection Data Encryption Computer science Management of Computing and Information Systems Computer Appl. in Administrative Data Processing Data encryption (Computer science) Computer security Congresses Security measures Computer networks security measures Data encryption (computer science)