Cantitate/Preț
Produs

Trusted Systems

Editat de Liqun Chen, Moti Yung
en Limba Engleză Paperback – 18 noi 2011
This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 32341 lei  22-36 zile
  Springer Berlin, Heidelberg – 15 iul 2010 32341 lei  22-36 zile
  Springer – 18 noi 2011 32605 lei  43-57 zile

Preț: 32605 lei

Preț vechi: 40756 lei
-20%

Puncte Express: 489

Preț estimativ în valută:
5766 6611$ 4983£

Carte tipărită la comandă

Livrare economică 27 aprilie-11 mai


Specificații

ISBN-13: 9783642252822
ISBN-10: 3642252826
Pagini: 376
Ilustrații: XIV, 362 p. 73 illus.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.57 kg
Ediția:2011
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Textul de pe ultima copertă

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2010, held in Beijing, China, in December 2010.
The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Caracteristici

Unique visibility State- of-the- art research Fast-track conference proceedings

Cuprins

Invited Talk.- On Design of a Trusted Software Base with Support of TPCM.- Secure Storage.- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing.- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks.- Attestation.- Remote Attestation on Function Execution (Work-in-Progress).- Scalable Remote Attestation with Privacy Protection.- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation.- Trusted Network.- SocialClouds: Concept, Security Architecture and Some Mechanisms.- Privacy Enhanced Trusted Network Connect.- Research on Multistage Interconnection Architecture and Collision Detection Model.- Virtualization.- Trusted Virtual Domains – Design, Implementation and Lessons Learned.- Trusted Integrity Measurement and Reporting for Virtualized Platforms.- Applications.- A Feather-Weight Application Isolation Model.- Exploring Trust of Mobile Applications Based on User Behaviors.- Trusted Firmware Services Based on TPM.- Supporting Technology.- Improved Cryptanalysis of the FOX Block Cipher.- Bitwise Higher Order Differential Cryptanalysis.