Trusted computing: principles and applications
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin ; Boston
De Gruyter
[2018]
|
Schriftenreihe: | Advances in computer science
volume 2 |
Schlagworte: | |
Online-Zugang: | http://www.degruyter.com/search?f_0=isbnissn&q_0=9783110476040&searchTitles=true Inhaltsverzeichnis |
Beschreibung: | XI, 300 Seiten Illustrationen, Diagramme 24 cm x 17 cm |
ISBN: | 9783110476040 9783110477603 |
Internformat
MARC
LEADER | 00000nam a22000008cb4500 | ||
---|---|---|---|
001 | BV044471057 | ||
003 | DE-604 | ||
005 | 20181128 | ||
007 | t | ||
008 | 170901s2018 gw a||| |||| 00||| eng d | ||
015 | |a 16,N46 |2 dnb | ||
016 | 7 | |a 1118516710 |2 DE-101 | |
020 | |a 9783110476040 |c Festeinband : EUR 99.95 (DE) (freier Preis), EUR 100.80 (AT) (freier Preis) |9 978-3-11-047604-0 | ||
020 | |a 9783110477603 |c Set |9 978-3-11-047760-3 | ||
035 | |a (OCoLC)1019895660 | ||
035 | |a (DE-599)DNB1118516710 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-29T |a DE-20 |a DE-703 |a DE-M347 | ||
082 | 0 | |a 004 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Feng, Dengguo |d 1965- |e Verfasser |0 (DE-588)130627569 |4 aut | |
245 | 1 | 0 | |a Trusted computing |b principles and applications |c Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao |
264 | 1 | |a Berlin ; Boston |b De Gruyter |c [2018] | |
300 | |a XI, 300 Seiten |b Illustrationen, Diagramme |c 24 cm x 17 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in computer science |v volume 2 | |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Qin, Yu |e Verfasser |4 aut | |
700 | 1 | |a Chu, Xiaobo |e Verfasser |4 aut | |
700 | 1 | |a Zhao, Shijun |e Verfasser |4 aut | |
710 | 2 | |a Walter de Gruyter GmbH & Co. KG |0 (DE-588)10095502-2 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF |z 978-3-11-047759-7 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 978-3-11-047609-5 |
830 | 0 | |a Advances in computer science |v volume 2 |w (DE-604)BV044719572 |9 2 | |
856 | 4 | 0 | |u http://www.degruyter.com/search?f_0=isbnissn&q_0=9783110476040&searchTitles=true |x Verlag |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029871480&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029871480 |
Datensatz im Suchindex
_version_ | 1804177801375383552 |
---|---|
adam_text | CONTENTS
1 INTRODUCTION * 1
1.1 RELATED W ORK* 2
1.1.1 SECURITY CHIP * 3
1.1.2 TRUST WITHIN A TERMINAL PLATFORM
-----
3
1.1.3 TRUST BETWEEN PLATFORMS * 4
1.1.4 TRUST IN NETWORK* 5
1.1.5 TEST AND EVALUATION OF TRUSTED COMPUTING* 6
1.2 OUR WORK
-------
7
1.2.1 CHAIN OF TRUST* 8
1.2.2 REMOTE ATTESTATION * 9
1.2.3 TRUSTED NETWORK CONNECTION * 12
1.2.4 APPLICATION OF TRUSTED COMPUTING
-----
13
1.2.5 TEST AND EVALUATION OF TRUSTED COMPUTING* 15
1.3 PROBLEMS AND CHALLENGES * 16
1.4 STRUCTURE OF THIS BOOK* 17
2 TRUSTED PLATFORM MODULE * 18
2.1 DESIGN GOALS
-----
19
2.2 TPM SECURITY CHIP
-----
20
2.2.1 INTRODUCTION
-----
20
2.2.2 PLATFORM DATA PROTECTION
-----
25
2.2.3 IDENTIFICATION * 29
2.2.4 INTEGRITY STORAGE AND REPORTING* 31
2.2.5 RESOURCE PROTECTION* 33
2.2.6 AUXILIARY FUNCTIONS * 39
2.3 TCM SECURITY CHIP
-----
44
2.3.1 MAIN FUNCTIONALITIES * 44
2.3.2 MAIN COMMAND INTERFACES * 50
2.4 MOBILE TRUSTED MODULE * 59
2.4.1 MAIN FEATURES OF MTM * 60
2.4.2 MTM FUNCTIONALITIES AND COMMANDS * 60
2.5 DEVELOPMENTS OF RELATED NEW TECHNOLOGIES *
2.5.1 DYNAMIC ROOT OF TRUST FOR MEASUREMENT* 63
2.5.2 VIRTUALIZATION TECHNOLOGY
-----
64
2.6 SUMMARY* 64
3 BUILDING CHAIN OF TRUST * 66
3.1 ROOT OF TRUST
-----
67
3.1.1 INTRODUCTION OF ROOT OF TRUST* 67
3.1.2 ROOT OF TRUST FOR MEASUREMENT* 67
3.1.3 ROOT OF TRUST FOR STORAGE AND REPORTING* 71
3.2 CHAIN OF TRUST* 72
3.2.1 THE PROPOSAL OF CHAIN OF TRUST* 72
3.2.2 CATEGORIES OF CHAIN OF TRUST* 73
3.2.3 COMPARISONS BETWEEN CHAINS OF TRUST * 78
3.3 SYSTEMS BASED ON STATIC CHAIN OF TRUST * 79
3.3.1 CHAIN OF TRUST AT BOOTLOADER* 81
3.3.2 CHAIN OF TRUST IN OS * 81
3.3.3 THE ISCAS CHAIN OF TRUST * 86
3.4 SYSTEMS BASED ON DYNAMIC CHAIN OF TRUST* 94
3.4.1 CHAIN OF TRUST AT BOOTLOADER* 95
3.4.2 CHAIN OF TRUST IN OS * 96
3.5 CHAIN OF TRUST FOR VIRTUALIZATION PLATFORMS * 98
3.6 SUMMARY* 99
4 TRUSTED SOFTWARE STACK * 100
4.1 TSS ARCHITECTURE AND FUNCTIONS * 101
4.1.1 TSS ARCHITECTURE * 101
4.1.2 TRUSTED DEVICE DRIVER* 102
4.1.3 TRUSTED DEVICE DRIVER LIBRARY* 103
4.1.4 TRUSTED CORE SERVICES * 104
4.1.5 TRUSTED SERVICE PROVIDER* 105
4.2 TSS INTERFACE * 106
4.2.1 OBJECT TYPE IN TSM * 107
4.2.2 TDDL INTERFACE IN TSM * 108
4.2.3 TCS INTERFACE IN TSM
-----
109
4.2.4 TSP INTERFACE IN TSM * 112
4.3 TRUSTED APPLICATION DEVELOPMENT* 119
4.3.1 CALLING METHOD OF INTERFACES * 120
4.3.2 EXAMPLE 1: FILE ENCRYPTION AND DECRYPTION * 121
4.3.3 EXAMPLE 2: SIGNATURE VERIFICATION IN DRM * 123
4.4 OPEN-SOURCE TSS IMPLEMENTATION * 126
4.4.1 TROUSERS * 126
4.4.2 JTSS
-----
128
4.4.3 PTSS
-----
130
4.5 SUMMARY * 132
5 TRUSTED COMPUTING PLATFORM * 133
5.1 INTRODUCTION * 133
5.1.1 DEVELOPMENT AND PRESENT STATUS * 134
5.1.2 BASIC ARCHITECTURE * 135
5.2 PERSONAL COMPUTER* 136
5.2.1 SPECIFICATION * 136
5.2.2 PRODUCTS AND APPLICATIONS * 137
5.3 SERVER* 138
5.3.1 SPECIFICATION * 139
5.3.2 PRODUCTS AND APPLICATIONS * 140
5.4 TRUSTED MOBILE PLATFORM* 141
5.4.1 SPECIFICATION
-----
141
5.4.2 GENERALIZED ARCHITECTURE * 142
5.4.3 IMPLEMENTATION OF TRUSTED MOBILE PLATFORM * 145
5.4.4 APPLICATIONS
-----
150
5.5 VIRTUALIZED TRUSTED PLATFORM * 151
5.5.1 REQUIREMENTS AND SPECIFICATION * 152
5.5.2 GENERALIZED ARCHITECTURE * 153
5.5.3 IMPLEMENTATION OF VIRTUALIZED TRUSTED PLATFORM * 154
5.5.4 APPLICATIONS
-----
160
5.6 APPLICATIONS OF TRUSTED COMPUTING PLATFORM * 161
5.6.1 DATA PROTECTION * 161
5.6.2 SECURITY AUTHENTICATION * 162
5.6.3 SYSTEM SECURITY ENHANCEMENT* 163
5.6.4 TRUSTED CLOUD SERVICES * 163
5.6.5 OTHER APPLICATIONS * 165
5.7 SUMMARY* 166
6 TEST AND EVALUATION OF TRUSTED COMPUTING * 168
6.1 COMPLIANCE TEST FOR TPM/TCM SPECIFICATIONS * 168
6.1.1 TEST MODEL * 169
6.1.2 TEST METHOD * 175
6.1.3 TEST IMPLEMENTATION * 178
6.2 ANALYSIS OF SECURITY MECHANISM OF TRUSTED COMPUTING* 180
6.2.1 ANALYSIS BASED ON MODEL CHECKING* 180
6.2.2 ANALYSIS BASED ON THEOREM PROVING* 183
6.3 EVALUATION AND CERTIFICATION OF TRUSTED COMPUTING* 186
6.3.1 COMMON CRITERIA * 186
6.3.2 TPM AND TNC CERTIFICATION * 187
6.4 COMPREHENSIVE TEST AND ANALYSIS SYSTEM
OF TRUSTED COMPUTING PLATFORM * 187
6.4.1 ARCHITECTURE AND FUNCTIONS OF SYSTEM * 188
6.4.2 COMPLIANCE TEST FOR TPM/TCM SPECIFICATION* 190
6.4.3 TESTS OF CRYPTOGRAPHY ALGORITHMS AND RANDOMS* 191
6.4.4 SIMULATION OF SECURITY CHIP AND PROTOCOL * 192
6.4.5 PROMOTION AND APPLICATION * 193
6.5 SUMMARY* 195
7 REMOTE ATTESTATION * 197
7.1 REMOTE ATTESTATION PRINCIPLE * 198
7.1.1 TECHNOLOGY FOUNDATION * 198
7.1.2 PROTOCOL M ODEL* 200
7.1.3 INTERFACE IMPLEMENTATION * 201
7.2 COMPARISON OF REMOTE ATTESTATION RESEARCHES * 206
7.2.1 ATTESTATION OF PLATFORM IDENTITY* 207
7.2.2 ATTESTATION OF PLATFORM INTEGRITY* 208
7.3 ATTESTATION OF PLATFORM IDENTITY* 210
7.3.1 ATTESTATION OF PLATFORM IDENTITY BASED ON PRIVACY CA* 210
7.3.2 DIRECT ANONYMOUS ATTESTATION * 212
7.3.3 RESEARCH PROSPECTS * 222
7.4 ATTESTATION OF PLATFORM INTEGRITY* 224
7.4.1 BINARY REMOTE ATTESTATION * 224
7.4.2 PROPERTY-BASED REMOTE ATTESTATION * 225
7.4.3 RESEARCH PROSPECTS * 235
7.5 REMOTE ATTESTATION SYSTEM AND APPLICATION * 235
7.5.1 REMOTE ATTESTATION SYSTEM IN SECURITY PC * 236
7.5.2 INTEGRITY VERIFICATION APPLICATION ON MOBILE PLATFORM * 239
7.5.3 REMOTE ATTESTATION INTEGRATED WITH THE TLS PROTOCOL* 240
7.6 SUMMARY * 241
8 TRUST NETWORK CONNECTION * 243
8.1 BACKGROUND OF TNC
-----
243
8.1.1 INTRODUCTION TO NAC * 243
8.1.2 COMMERCIAL NAC SOLUTIONS * 245
8.1.3 DEFECTS OF CURRENT SOLUTIONS AND TNC MOTIVATION * 248
8.2 ARCHITECTURE AND PRINCIPLES OF TNC * 249
8.2.1 STANDARD ARCHITECTURE * 249
8.2.2 OVERALL ARCHITECTURE * 249
8.2.3 WORKFLOW* 253
8.2.4, THE ADVANTAGES AND DISADVANTAGES OF TNC * 254
8.3 RESEARCH ON EXTENSION OF TNC * 255
8.3.1 OVERVIEW OF THE TNC RESEARCH * 255
8.3.2 TRUST@FHH
-----
256
8.3.3 ISCAS TRUSTED NETWORK CONNECTION SYSTEM * 258
8.4 APPLICATION OF TRUSTED NETWORK CONNECTION * 262
8.5 SUMMARY * 263
APPENDIX A: FOUNDATIONS OF CRYPTOGRAPHY * 265
A .L BLOCK CIPHER ALGORITHM * 265
A.1.1 AES
------
265
A.1.2 SM S4-------273
A.2 PUBLIC-KEY CRYPTOGRAPHY ALGORITHM * 275
A.2.1 RSA
-------
276
A.2.2 ELLIPTIC CURVE PUBLIC-KEY ENCRYPTION ALGORITHM * 277
A.2.3 SM2 PUBLIC-KEY ENCRYPTION ALGORITHM
-----
277
A.3 DIGITAL SIGNATURE ALGORITHM * 278
A.3.1 ECDSA DIGITAL SIGNATURE ALGORITHM
-----
279
A.3.2 SM2 DIGITAL SIGNATURE
------
280
A.4 HASH FUNCTION * 281
A.4.1 SHA-256 HASH ALGORITHM
------
282
A.4.2 SM3 HASH ALGORITHM
------
283
A.5 KEY EXCHANGE PROTOCOLS * 285
A.5.1 MQV KEY EXCHANGE PROTOCOL * 286
A.5.2 SM2 KEY EXCHANGE PROTOCOL
------
287
REFERENCES* 289
INDEX* 299
|
any_adam_object | 1 |
author | Feng, Dengguo 1965- Qin, Yu Chu, Xiaobo Zhao, Shijun |
author_GND | (DE-588)130627569 |
author_facet | Feng, Dengguo 1965- Qin, Yu Chu, Xiaobo Zhao, Shijun |
author_role | aut aut aut aut |
author_sort | Feng, Dengguo 1965- |
author_variant | d f df y q yq x c xc s z sz |
building | Verbundindex |
bvnumber | BV044471057 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1019895660 (DE-599)DNB1118516710 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02139nam a22004938cb4500</leader><controlfield tag="001">BV044471057</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20181128 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170901s2018 gw a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">16,N46</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1118516710</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110476040</subfield><subfield code="c">Festeinband : EUR 99.95 (DE) (freier Preis), EUR 100.80 (AT) (freier Preis)</subfield><subfield code="9">978-3-11-047604-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110477603</subfield><subfield code="c">Set</subfield><subfield code="9">978-3-11-047760-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1019895660</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1118516710</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-M347</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Feng, Dengguo</subfield><subfield code="d">1965-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130627569</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted computing</subfield><subfield code="b">principles and applications</subfield><subfield code="c">Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Boston</subfield><subfield code="b">De Gruyter</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 300 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">24 cm x 17 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in computer science</subfield><subfield code="v">volume 2</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qin, Yu</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chu, Xiaobo</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhao, Shijun</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Walter de Gruyter GmbH & Co. KG</subfield><subfield code="0">(DE-588)10095502-2</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">978-3-11-047759-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-3-11-047609-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in computer science</subfield><subfield code="v">volume 2</subfield><subfield code="w">(DE-604)BV044719572</subfield><subfield code="9">2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.degruyter.com/search?f_0=isbnissn&q_0=9783110476040&searchTitles=true</subfield><subfield code="x">Verlag</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029871480&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029871480</subfield></datafield></record></collection> |
id | DE-604.BV044471057 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:53:51Z |
institution | BVB |
institution_GND | (DE-588)10095502-2 |
isbn | 9783110476040 9783110477603 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029871480 |
oclc_num | 1019895660 |
open_access_boolean | |
owner | DE-29T DE-20 DE-703 DE-M347 |
owner_facet | DE-29T DE-20 DE-703 DE-M347 |
physical | XI, 300 Seiten Illustrationen, Diagramme 24 cm x 17 cm |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | De Gruyter |
record_format | marc |
series | Advances in computer science |
series2 | Advances in computer science |
spelling | Feng, Dengguo 1965- Verfasser (DE-588)130627569 aut Trusted computing principles and applications Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao Berlin ; Boston De Gruyter [2018] XI, 300 Seiten Illustrationen, Diagramme 24 cm x 17 cm txt rdacontent n rdamedia nc rdacarrier Advances in computer science volume 2 Trusted Computing (DE-588)7562931-8 gnd rswk-swf Trusted Computing (DE-588)7562931-8 s DE-604 Qin, Yu Verfasser aut Chu, Xiaobo Verfasser aut Zhao, Shijun Verfasser aut Walter de Gruyter GmbH & Co. KG (DE-588)10095502-2 pbl Erscheint auch als Online-Ausgabe, PDF 978-3-11-047759-7 Erscheint auch als Online-Ausgabe, EPUB 978-3-11-047609-5 Advances in computer science volume 2 (DE-604)BV044719572 2 http://www.degruyter.com/search?f_0=isbnissn&q_0=9783110476040&searchTitles=true Verlag DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029871480&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Feng, Dengguo 1965- Qin, Yu Chu, Xiaobo Zhao, Shijun Trusted computing principles and applications Advances in computer science Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)7562931-8 |
title | Trusted computing principles and applications |
title_auth | Trusted computing principles and applications |
title_exact_search | Trusted computing principles and applications |
title_full | Trusted computing principles and applications Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao |
title_fullStr | Trusted computing principles and applications Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao |
title_full_unstemmed | Trusted computing principles and applications Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao |
title_short | Trusted computing |
title_sort | trusted computing principles and applications |
title_sub | principles and applications |
topic | Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Trusted Computing |
url | http://www.degruyter.com/search?f_0=isbnissn&q_0=9783110476040&searchTitles=true http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029871480&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV044719572 |
work_keys_str_mv | AT fengdengguo trustedcomputingprinciplesandapplications AT qinyu trustedcomputingprinciplesandapplications AT chuxiaobo trustedcomputingprinciplesandapplications AT zhaoshijun trustedcomputingprinciplesandapplications AT walterdegruytergmbhcokg trustedcomputingprinciplesandapplications |