Trusted Systems: Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers: Lecture Notes in Computer Science, cartea 6802
Editat de Liqun Chen, Moti Yungen Limba Engleză Paperback – 18 noi 2011
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (2) | 329.44 lei 3-5 săpt. | |
Springer Berlin, Heidelberg – 15 iul 2010 | 329.44 lei 3-5 săpt. | |
Springer Berlin, Heidelberg – 18 noi 2011 | 329.58 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20% Preț: 571.63 lei
- 20% Preț: 336.71 lei
- 20% Preț: 333.46 lei
- 20% Preț: 662.76 lei
- 20% Preț: 330.23 lei
- 20% Preț: 747.79 lei
- 20% Preț: 438.67 lei
- 20% Preț: 369.12 lei
- 20% Preț: 315.76 lei
- 20% Preț: 584.40 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 315.18 lei
- 20% Preț: 256.26 lei
- 20% Preț: 1040.03 lei
- 20% Preț: 504.56 lei
- Preț: 402.62 lei
- 20% Preț: 346.40 lei
- 20% Preț: 301.94 lei
- 20% Preț: 237.99 lei
- 5% Preț: 365.59 lei
- 20% Preț: 309.89 lei
- 20% Preț: 321.95 lei
- 20% Preț: 310.25 lei
- 20% Preț: 334.68 lei
- Preț: 373.56 lei
- 20% Preț: 172.68 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 315.76 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 444.17 lei
- 20% Preț: 567.60 lei
- 20% Preț: 632.22 lei
- 17% Preț: 360.18 lei
- 20% Preț: 538.28 lei
- 20% Preț: 335.08 lei
- 20% Preț: 307.68 lei
- 20% Preț: 343.16 lei
- 20% Preț: 641.78 lei
- 20% Preț: 579.56 lei
- 20% Preț: 1053.45 lei
- 15% Preț: 568.74 lei
- Preț: 389.47 lei
- 20% Preț: 333.46 lei
- 20% Preț: 607.38 lei
- 20% Preț: 326.97 lei
Preț: 329.58 lei
Preț vechi: 411.98 lei
-20% Nou
Puncte Express: 494
Preț estimativ în valută:
63.07€ • 66.35$ • 52.22£
63.07€ • 66.35$ • 52.22£
Carte tipărită la comandă
Livrare economică 14-28 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642252822
ISBN-10: 3642252826
Pagini: 378
Ilustrații: XIV, 362 p. 73 illus.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.53 kg
Ediția:2011
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642252826
Pagini: 378
Ilustrații: XIV, 362 p. 73 illus.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.53 kg
Ediția:2011
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchTextul de pe ultima copertă
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2010, held in Beijing, China, in December 2010.
The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
Caracteristici
Unique visibility State- of-the- art research Fast-track conference proceedings
Cuprins
Invited Talk.- On Design of a Trusted Software Base with Support of TPCM.- Secure Storage.- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing.- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks.- Attestation.- Remote Attestation on Function Execution (Work-in-Progress).- Scalable Remote Attestation with Privacy Protection.- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation.- Trusted Network.- SocialClouds: Concept, Security Architecture and Some Mechanisms.- Privacy Enhanced Trusted Network Connect.- Research on Multistage Interconnection Architecture and Collision Detection Model.- Virtualization.- Trusted Virtual Domains – Design, Implementation and Lessons Learned.- Trusted Integrity Measurement and Reporting for Virtualized Platforms.- Applications.- A Feather-Weight Application Isolation Model.- Exploring Trust of Mobile Applications Based on User Behaviors.- Trusted Firmware Services Based on TPM.- Supporting Technology.- Improved Cryptanalysis of the FOX Block Cipher.- Bitwise Higher Order Differential Cryptanalysis.