Cantitate/Preț
Produs

Trusted Systems: Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers: Lecture Notes in Computer Science, cartea 6802

Editat de Liqun Chen, Moti Yung
en Limba Engleză Paperback – 18 noi 2011
This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 32944 lei  3-5 săpt.
  Springer Berlin, Heidelberg – 15 iul 2010 32944 lei  3-5 săpt.
  Springer Berlin, Heidelberg – 18 noi 2011 32958 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 32958 lei

Preț vechi: 41198 lei
-20% Nou

Puncte Express: 494

Preț estimativ în valută:
6307 6635$ 5222£

Carte tipărită la comandă

Livrare economică 14-28 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642252822
ISBN-10: 3642252826
Pagini: 378
Ilustrații: XIV, 362 p. 73 illus.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.53 kg
Ediția:2011
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Textul de pe ultima copertă

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2010, held in Beijing, China, in December 2010.
The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Caracteristici

Unique visibility State- of-the- art research Fast-track conference proceedings

Cuprins

Invited Talk.- On Design of a Trusted Software Base with Support of TPCM.- Secure Storage.- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing.- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks.- Attestation.- Remote Attestation on Function Execution (Work-in-Progress).- Scalable Remote Attestation with Privacy Protection.- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation.- Trusted Network.- SocialClouds: Concept, Security Architecture and Some Mechanisms.- Privacy Enhanced Trusted Network Connect.- Research on Multistage Interconnection Architecture and Collision Detection Model.- Virtualization.- Trusted Virtual Domains – Design, Implementation and Lessons Learned.- Trusted Integrity Measurement and Reporting for Virtualized Platforms.- Applications.- A Feather-Weight Application Isolation Model.- Exploring Trust of Mobile Applications Based on User Behaviors.- Trusted Firmware Services Based on TPM.- Supporting Technology.- Improved Cryptanalysis of the FOX Block Cipher.- Bitwise Higher Order Differential Cryptanalysis.