Trusted Computing Platforms: TPM2.0 in Context
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham ; Heidelberg ; New York ; Dordrecht ; London
Springer
[2014]
|
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHM01 FHN01 FKE01 FRO01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XVIII, 382 Seiten) Illustrationen, Diagramme |
ISBN: | 9783319087443 |
DOI: | 10.1007/978-3-319-08744-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042325944 | ||
003 | DE-604 | ||
005 | 20160530 | ||
007 | cr|uuu---uuuuu | ||
008 | 150204s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783319087443 |c Online |9 978-3-319-08744-3 | ||
024 | 7 | |a 10.1007/978-3-319-08744-3 |2 doi | |
035 | |a (OCoLC)902885753 | ||
035 | |a (DE-599)BVBBV042325944 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-522 |a DE-Aug4 |a DE-861 |a DE-M347 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a SR 860 |0 (DE-625)143367: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Proudler, Graeme |e Verfasser |4 aut | |
245 | 1 | 0 | |a Trusted Computing Platforms |b TPM2.0 in Context |c Graeme Proudler, Liqun Chen, Chris Dalton |
264 | 1 | |a Cham ; Heidelberg ; New York ; Dordrecht ; London |b Springer |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 Online-Ressource (XVIII, 382 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Systemplattform |0 (DE-588)4674460-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Systemplattform |0 (DE-588)4674460-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Chen, Liqun |e Verfasser |0 (DE-588)174012950 |4 aut | |
700 | 1 | |a Dalton, Chris |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-08743-6 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-08744-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762781&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762781&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2014 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027762781 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l BFB01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08744-3 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152927503253504 |
---|---|
adam_text | TRUSTED COMPUTING PLATFORMS
/ PROUDLER, GRAEME
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION TO TRUSTED COMPUTING
FUTURES FOR TRUSTED COMPUTING
BASICS OF TRUSTED PLATFORMS
TRUSTED PLATFORM ARCHITECTURE
TPM2 REQUIREMENTS
TPM2 OPERATION
INITIALISING TPM2
MANAGING TPM2
ACCESSING KEYS AND DATA IN TPM2
CUSTOMER CONFIGURATION OF TPM2 AND ITS HOST PLATFORM
STARTING TO USE TPM2
DIRECT ANONYMOUS ATTESTATION (DAA) IN MORE DEPTH
MACHINE VIRTUALISATION, VIRTUAL MACHINES, AND TPMS
INDEX
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
TRUSTED COMPUTING PLATFORMS
/ PROUDLER, GRAEME
: 2014
ABSTRACT / INHALTSTEXT
IN THIS BOOK THE AUTHORS FIRST DESCRIBE THE BACKGROUND OF TRUSTED
PLATFORMS AND TRUSTED COMPUTING, AND SPECULATE ABOUT THE FUTURE. THEY
THEN DESCRIBE THE TECHNICAL FEATURES AND ARCHITECTURES OF TRUSTED
PLATFORMS FROM SEVERAL DIFFERENT PERSPECTIVES, FINALLY EXPLAINING
SECOND-GENERATION TPMS, INCLUDING A TECHNICAL DESCRIPTION INTENDED TO
SUPPLEMENT THE TRUSTED COMPUTING GROUP S TPM2 SPECIFICATIONS. THE
INTENDED AUDIENCE IS IT MANAGERS AND ENGINEERS, AND GRADUATE STUDENTS IN
INFORMATION SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Proudler, Graeme Chen, Liqun Dalton, Chris |
author_GND | (DE-588)174012950 |
author_facet | Proudler, Graeme Chen, Liqun Dalton, Chris |
author_role | aut aut aut |
author_sort | Proudler, Graeme |
author_variant | g p gp l c lc c d cd |
building | Verbundindex |
bvnumber | BV042325944 |
classification_rvk | SR 860 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)902885753 (DE-599)BVBBV042325944 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-08744-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03974nmm a2200769zc 4500</leader><controlfield tag="001">BV042325944</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160530 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150204s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319087443</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-08744-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-08744-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)902885753</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042325944</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 860</subfield><subfield code="0">(DE-625)143367:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Proudler, Graeme</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted Computing Platforms</subfield><subfield code="b">TPM2.0 in Context</subfield><subfield code="c">Graeme Proudler, Liqun Chen, Chris Dalton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham ; Heidelberg ; New York ; Dordrecht ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVIII, 382 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systemplattform</subfield><subfield code="0">(DE-588)4674460-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Systemplattform</subfield><subfield code="0">(DE-588)4674460-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Liqun</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)174012950</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dalton, Chris</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-08743-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762781&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762781&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2014</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027762781</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08744-3</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042325944 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:29Z |
institution | BVB |
isbn | 9783319087443 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027762781 |
oclc_num | 902885753 |
open_access_boolean | |
owner | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVIII, 382 Seiten) Illustrationen, Diagramme |
psigel | ZDB-2-SCS ZDB-2-SCS_2014 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
spelling | Proudler, Graeme Verfasser aut Trusted Computing Platforms TPM2.0 in Context Graeme Proudler, Liqun Chen, Chris Dalton Cham ; Heidelberg ; New York ; Dordrecht ; London Springer [2014] © 2014 1 Online-Ressource (XVIII, 382 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Computer science Data protection Data encryption (Computer science) Telecommunication Computer Science Systems and Data Security Data Encryption Communications Engineering, Networks Security Science and Technology Informatik Systemplattform (DE-588)4674460-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Trusted Computing (DE-588)7562931-8 s Computersicherheit (DE-588)4274324-2 s Systemplattform (DE-588)4674460-5 s DE-604 Chen, Liqun Verfasser (DE-588)174012950 aut Dalton, Chris Verfasser aut Erscheint auch als Druckausgabe 978-3-319-08743-6 https://doi.org/10.1007/978-3-319-08744-3 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762781&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762781&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Proudler, Graeme Chen, Liqun Dalton, Chris Trusted Computing Platforms TPM2.0 in Context Computer science Data protection Data encryption (Computer science) Telecommunication Computer Science Systems and Data Security Data Encryption Communications Engineering, Networks Security Science and Technology Informatik Systemplattform (DE-588)4674460-5 gnd Computersicherheit (DE-588)4274324-2 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4674460-5 (DE-588)4274324-2 (DE-588)7562931-8 |
title | Trusted Computing Platforms TPM2.0 in Context |
title_auth | Trusted Computing Platforms TPM2.0 in Context |
title_exact_search | Trusted Computing Platforms TPM2.0 in Context |
title_full | Trusted Computing Platforms TPM2.0 in Context Graeme Proudler, Liqun Chen, Chris Dalton |
title_fullStr | Trusted Computing Platforms TPM2.0 in Context Graeme Proudler, Liqun Chen, Chris Dalton |
title_full_unstemmed | Trusted Computing Platforms TPM2.0 in Context Graeme Proudler, Liqun Chen, Chris Dalton |
title_short | Trusted Computing Platforms |
title_sort | trusted computing platforms tpm2 0 in context |
title_sub | TPM2.0 in Context |
topic | Computer science Data protection Data encryption (Computer science) Telecommunication Computer Science Systems and Data Security Data Encryption Communications Engineering, Networks Security Science and Technology Informatik Systemplattform (DE-588)4674460-5 gnd Computersicherheit (DE-588)4274324-2 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Computer science Data protection Data encryption (Computer science) Telecommunication Computer Science Systems and Data Security Data Encryption Communications Engineering, Networks Security Science and Technology Informatik Systemplattform Computersicherheit Trusted Computing |
url | https://doi.org/10.1007/978-3-319-08744-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762781&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762781&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT proudlergraeme trustedcomputingplatformstpm20incontext AT chenliqun trustedcomputingplatformstpm20incontext AT daltonchris trustedcomputingplatformstpm20incontext |