Trusted computing :: principles and applications /

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Feng, Dengguo (VerfasserIn), Qin, Yu (VerfasserIn), Chu, Xiaobo (VerfasserIn), Zhao, Shijun (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Berlin : De Gruyter, [2018]
Schriftenreihe:Advances in computer science ; volume 2.
Schlagworte:
Online-Zugang:Volltext
Zusammenfassung:The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Beschreibung:1 online resource (1 volume) : illustrations
Bibliographie:Includes bibliographical references and index.
ISBN:9783110477603
3110477602
9783110477597
3110477599

Es ist kein Print-Exemplar vorhanden.

Volltext öffnen