Trusted Computing - Challenges and Applications

Peter Lipp (Editor), Ahmad-Reza Sadeghi (Editor), Klaus-Michael Koch (Editor)

Research output: Book/ReportBookResearch

Original languageEnglish
Place of PublicationHeidelberg
PublisherSpringer
Volume4968
Edition1
ISBN (Print)978-3-540-68978-2
DOIs
Publication statusPublished - 2008

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Treatment code (Nähere Zuordnung)

  • Basic - Fundamental (Grundlagenforschung)
  • Application

Cite this

Lipp, P., Sadeghi, A-R., & Koch, K-M. (Eds.) (2008). Trusted Computing - Challenges and Applications. (1 ed.) (Lecture Notes in Computer Science). Heidelberg: Springer. https://doi.org/10.1007/978-3-540-68979-9

Trusted Computing - Challenges and Applications. / Lipp, Peter (Editor); Sadeghi, Ahmad-Reza (Editor); Koch, Klaus-Michael (Editor).

1 ed. Heidelberg : Springer, 2008. (Lecture Notes in Computer Science).

Research output: Book/ReportBookResearch

Lipp, P, Sadeghi, A-R & Koch, K-M (eds) 2008, Trusted Computing - Challenges and Applications. Lecture Notes in Computer Science, vol. 4968, 1 edn, Springer, Heidelberg. https://doi.org/10.1007/978-3-540-68979-9
Lipp P, (ed.), Sadeghi A-R, (ed.), Koch K-M, (ed.). Trusted Computing - Challenges and Applications. 1 ed. Heidelberg: Springer, 2008. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-540-68979-9
Lipp, Peter (Editor) ; Sadeghi, Ahmad-Reza (Editor) ; Koch, Klaus-Michael (Editor). / Trusted Computing - Challenges and Applications. 1 ed. Heidelberg : Springer, 2008. (Lecture Notes in Computer Science).
@book{a6c9b027092b434f82878e03639dbce4,
title = "Trusted Computing - Challenges and Applications",
editor = "Peter Lipp and Ahmad-Reza Sadeghi and Klaus-Michael Koch",
year = "2008",
doi = "10.1007/978-3-540-68979-9",
language = "English",
isbn = "978-3-540-68978-2",
volume = "4968",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
edition = "1",

}

TY - BOOK

T1 - Trusted Computing - Challenges and Applications

A2 - Lipp, Peter

A2 - Sadeghi, Ahmad-Reza

A2 - Koch, Klaus-Michael

PY - 2008

Y1 - 2008

UR - http://www.springer.com/computer/security+and+cryptology/book/978-3-540-68978-2

U2 - 10.1007/978-3-540-68979-9

DO - 10.1007/978-3-540-68979-9

M3 - Book

SN - 978-3-540-68978-2

VL - 4968

T3 - Lecture Notes in Computer Science

BT - Trusted Computing - Challenges and Applications

PB - Springer

CY - Heidelberg

ER -