Trusted Computing

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Verwandte Artikel

Download
PDF
Trusted Computing Dengguo Feng

129,95 €*
Download
ePUB
Trusted Computing Dengguo Feng

129,95 €*

Weitere Produkte vom selben Autor

Boolean Functions and Their Applications in Cryptography Feng, Dengguo, Wu, Chuan-Kun

139,09 €*
Privacy-Preserving Techniques with e-Healthcare Applications Zhu, Dan, Shen, Xuemin (Sherman), Feng, Dengguo

139,09 €*
Boolean Functions and Their Applications in Cryptography Feng, Dengguo, Wu, Chuan-Kun

139,09 €*