Cantitate/Preț
Produs

Trusted Systems: 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings: Lecture Notes in Computer Science, cartea 8292

Editat de Roderick Bloem, Peter Lipp
en Limba Engleză Paperback – 11 noi 2013
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 31696 lei

Preț vechi: 39621 lei
-20% Nou

Puncte Express: 475

Preț estimativ în valută:
6066 6301$ 5039£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319034904
ISBN-10: 3319034901
Pagini: 116
Ilustrații: XII, 103 p. 18 illus.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.17 kg
Ediția:2013
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Public țintă

Research

Cuprins

Hardware-Based Security and Applications.- Para-Virtualizing the Trusted Platform Module: An Enterprise.- Framework Based on Version 2.0 Specification.- The PACE|CA Protocol for Machine Readable Travel Documents.- A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions.- Access Control, Integrity and Policy Enforcement.

Textul de pe ultima copertă

This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.

Caracteristici

Fast-track conference proceedings State-of-the-art research Up to date results