Trusted Execution Environments

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Shepherd, Carlton (VerfasserIn), Markantonakis, Konstantinos (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Cham Springer International Publishing 2024
Cham Springer
Ausgabe:1st ed. 2024
Schlagworte:
Online-Zugang:DE-522
DE-634
DE-Aug4
DE-1050
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-91
DE-384
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-824
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV049781080
003 DE-604
005 20241011
007 cr|uuu---uuuuu
008 240715s2024 xx o|||| 00||| eng d
020 |a 9783031555619  |c Online  |9 978-3-031-55561-9 
024 7 |a 10.1007/978-3-031-55561-9  |2 doi 
035 |a (ZDB-2-SCS)9783031555619 
035 |a (OCoLC)1446259567 
035 |a (DE-599)BVBBV049781080 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-1050  |a DE-20  |a DE-862  |a DE-92  |a DE-355  |a DE-824  |a DE-522  |a DE-384  |a DE-M347  |a DE-573  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
084 |a DAT 460  |2 stub 
100 1 |a Shepherd, Carlton  |e Verfasser  |4 aut 
245 1 0 |a Trusted Execution Environments  |c by Carlton Shepherd, Konstantinos Markantonakis 
250 |a 1st ed. 2024 
264 1 |a Cham  |b Springer International Publishing  |c 2024 
264 1 |a Cham  |b Springer 
300 |a 1 Online-Ressource (XXVIII, 196 p. 59 illus., 51 illus. in color) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
650 4 |a Data and Information Security 
650 4 |a Mobile and Network Security 
650 4 |a Cryptology 
650 4 |a Cyber-Physical Systems 
650 4 |a Data protection 
650 4 |a Computer networks / Security measures 
650 4 |a Cryptography 
650 4 |a Data encryption (Computer science) 
650 4 |a Cooperating objects (Computer systems) 
700 1 |a Markantonakis, Konstantinos  |4 aut 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-031-55560-2 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-031-55562-6 
856 4 0 |u https://doi.org/10.1007/978-3-031-55561-9  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
940 1 |q ZDB-2-SCS_2024 
943 1 |a oai:aleph.bib-bvb.de:BVB01-035122061 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-522  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-Aug4  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-1050  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-573  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-92  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-898  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-859  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-860  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-861  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-863  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-862  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-523  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-91  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-384  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-19  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-703  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-20  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-706  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-824  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-29  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-55561-9  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2801816
DE-BY-UBM_katkey 6645271
DE-BY-UBM_local_url Verlag
https://doi.org/10.1007/978-3-031-55561-9
DE-BY-UBR_katkey 7003692
_version_ 1823049418532716544
any_adam_object
author Shepherd, Carlton
Markantonakis, Konstantinos
author_facet Shepherd, Carlton
Markantonakis, Konstantinos
author_role aut
aut
author_sort Shepherd, Carlton
author_variant c s cs
k m km
building Verbundindex
bvnumber BV049781080
classification_rvk ST 277
classification_tum DAT 460
collection ZDB-2-SCS
ctrlnum (ZDB-2-SCS)9783031555619
(OCoLC)1446259567
(DE-599)BVBBV049781080
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-031-55561-9
edition 1st ed. 2024
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04358nam a2200817zc 4500</leader><controlfield tag="001">BV049781080</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241011 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240715s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031555619</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-55561-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-55561-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783031555619</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1446259567</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049781080</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shepherd, Carlton</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted Execution Environments</subfield><subfield code="c">by Carlton Shepherd, Konstantinos Markantonakis</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXVIII, 196 p. 59 illus., 51 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber-Physical Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cooperating objects (Computer systems)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Markantonakis, Konstantinos</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-55560-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-55562-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2024</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035122061</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-55561-9</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV049781080
illustrated Not Illustrated
indexdate 2025-02-03T15:58:23Z
institution BVB
isbn 9783031555619
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-035122061
oclc_num 1446259567
open_access_boolean
owner DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-824
DE-522
DE-384
DE-M347
DE-573
DE-703
DE-706
DE-739
DE-634
owner_facet DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-824
DE-522
DE-384
DE-M347
DE-573
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (XXVIII, 196 p. 59 illus., 51 illus. in color)
psigel ZDB-2-SCS
ZDB-2-SCS_2024
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher Springer International Publishing
Springer
record_format marc
spellingShingle Shepherd, Carlton
Markantonakis, Konstantinos
Trusted Execution Environments
Data and Information Security
Mobile and Network Security
Cryptology
Cyber-Physical Systems
Data protection
Computer networks / Security measures
Cryptography
Data encryption (Computer science)
Cooperating objects (Computer systems)
title Trusted Execution Environments
title_auth Trusted Execution Environments
title_exact_search Trusted Execution Environments
title_full Trusted Execution Environments by Carlton Shepherd, Konstantinos Markantonakis
title_fullStr Trusted Execution Environments by Carlton Shepherd, Konstantinos Markantonakis
title_full_unstemmed Trusted Execution Environments by Carlton Shepherd, Konstantinos Markantonakis
title_short Trusted Execution Environments
title_sort trusted execution environments
topic Data and Information Security
Mobile and Network Security
Cryptology
Cyber-Physical Systems
Data protection
Computer networks / Security measures
Cryptography
Data encryption (Computer science)
Cooperating objects (Computer systems)
topic_facet Data and Information Security
Mobile and Network Security
Cryptology
Cyber-Physical Systems
Data protection
Computer networks / Security measures
Cryptography
Data encryption (Computer science)
Cooperating objects (Computer systems)
url https://doi.org/10.1007/978-3-031-55561-9
work_keys_str_mv AT shepherdcarlton trustedexecutionenvironments
AT markantonakiskonstantinos trustedexecutionenvironments