Normal view MARC view ISBD view

Trusted Computing : Principles and Applications / Dengguo Feng.

By: Feng, Dengguo [author.].
Contributor(s): Tsinghua University Press [contributor.].
Material type: materialTypeLabelBookSeries: Advances in Computer Science , 2.Publisher: Berlin ; Boston : De Gruyter, [2017]Copyright date: ©2018Description: 1 online resource (XI, 300 p.).Content type: text Media type: computer Carrier type: online resourceISBN: 9783110477597.Subject(s): Information technology -- Management | Information technology -- Security measures | COMPUTERS / Security / NetworkingAdditional physical formats: No title; No titleDDC classification: 005.8 Online resources: Click here to access online | Click here to access online | Cover Issued also in print.
Contents:
Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
Title is part of eBook package:DG Plus DeG Package 2018 Part 1Title is part of eBook package:DG Plus eBook-Package 2018Title is part of eBook package:EBOOK PACKAGE COMPLETE 2017Title is part of eBook package:EBOOK PACKAGE COMPLETE ENGLISH 2017Title is part of eBook package:EBOOK PACKAGE Engineering, Computer Sciences 2017Summary: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
    average rating: 0.0 (0 votes)
No physical items for this record

Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index

restricted access online access with authorization star

http://purl.org/coar/access_right/c_16ec

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Issued also in print.

Mode of access: Internet via World Wide Web.

In English.

Description based on online resource; title from PDF title page (publisher's Web site, viewed 28. Feb 2023)

There are no comments for this item.

Log in to your account to post a comment.