Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6101
Editat de Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghien Limba Engleză Paperback – 9 iun 2010
Din seria Lecture Notes in Computer Science
- 20% Preț: 1021.30 lei
- 20% Preț: 337.03 lei
- 20% Preț: 340.22 lei
- 20% Preț: 256.27 lei
- 20% Preț: 324.32 lei
- 20% Preț: 438.69 lei
- 20% Preț: 315.78 lei
- 20% Preț: 327.52 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 557.41 lei
- 20% Preț: 561.37 lei
- 15% Preț: 558.56 lei
- 20% Preț: 238.01 lei
- 20% Preț: 504.57 lei
- 20% Preț: 329.09 lei
- 20% Preț: 563.75 lei
- 20% Preț: 630.24 lei
- 20% Preț: 321.96 lei
- 20% Preț: 1361.10 lei
- 20% Preț: 310.26 lei
- 20% Preț: 607.39 lei
- Preț: 366.90 lei
- 20% Preț: 172.69 lei
- 20% Preț: 315.19 lei
- 20% Preț: 985.59 lei
- 20% Preț: 620.87 lei
- 20% Preț: 436.22 lei
- 20% Preț: 734.34 lei
- 20% Preț: 1034.49 lei
- 17% Preț: 360.19 lei
- 20% Preț: 309.90 lei
- 20% Preț: 573.92 lei
- 20% Preț: 301.95 lei
- 20% Preț: 307.71 lei
- 20% Preț: 369.12 lei
- 20% Preț: 327.52 lei
- 20% Preț: 794.65 lei
- 20% Preț: 569.16 lei
- Preț: 395.43 lei
- 20% Preț: 1138.26 lei
- 20% Preț: 734.34 lei
- 20% Preț: 315.78 lei
- 20% Preț: 330.70 lei
- 20% Preț: 538.29 lei
- 20% Preț: 326.98 lei
Preț: 329.89 lei
Preț vechi: 412.37 lei
-20% Nou
Puncte Express: 495
Preț estimativ în valută:
63.14€ • 66.61$ • 52.62£
63.14€ • 66.61$ • 52.62£
Carte disponibilă
Livrare economică 12-26 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642138683
ISBN-10: 3642138683
Pagini: 453
Ilustrații: XIII, 441 p. 84 illus.
Greutate: 0.7 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642138683
Pagini: 453
Ilustrații: XIII, 441 p. 84 illus.
Greutate: 0.7 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Technical Strand—Full Papers.- Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform.- SBAP: Software-Based Attestation for Peripherals.- Key Attestation from Trusted Execution Environments.- Anonymous Authentication with TLS and DAA.- Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.- Towards a Trusted Mobile Desktop.- Application of Trusted Computing in Automation to Prevent Product Piracy.- Lagrangian E-Voting: Verifiability on Demand and Strong Privacy.- ?TSS – A Simplified Trusted Software Stack.- Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture.- A DAA Scheme Using Batch Proof and Verification.- A Pairing-Based DAA Scheme Further Reducing TPM Resources.- An Anonymous Attestation Scheme with Optional Traceability.- Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing.- SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms.- Technical Strand—Short Papers.- Escrowed Data and the Digital Envelope.- Engineering Attestable Services.- Dynamic Enforcement of Platform Integrity.- An Improved Memory Integrity Protection Scheme.- Robust Combiners for Software Hardening.- The PUF Promise.- Socio-Economic Strand.- Privacy Requirements Engineering for Trustworthy e-Government Services.- Can Competitive Insurers Improve Network Security?.- Nudge: Intermediaries’ Role in Interdependent Network Security.- How the Public Views Strategies Designed to Reduce the Threat of Botnets.- Axiomatic and Behavioural Trust.- The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.org.- The Role of Soft Information in Trust Building: Evidence from OnlineSocial Lending.- Software on the Witness Stand: What Should It Take for Us to Trust It?.- Workshop on Trust in the Cloud.- Token-Based Cloud Computing.- Workshop on Security Hardware.- Oblivious Transfer Based on Physical Unclonable Functions.