Trusted Computing : : Principles and Applications / / Dengguo Feng.

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Plus DeG Package 2018 Part 1
VerfasserIn:
MitwirkendeR:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2017]
©2018
Year of Publication:2017
Language:English
Series:Advances in Computer Science , 2
Online Access:
Physical Description:1 online resource (XI, 300 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Other title:Frontmatter --
Preface --
Contents --
1. Introduction --
2. Trusted Platform Module --
3. Building Chain of Trust --
4. Trusted Software Stack --
5. Trusted Computing Platform --
6. Test and Evaluation of Trusted Computing --
7. Remote Attestation --
8. Trust Network Connection --
Appendix A: Foundations of Cryptography --
References --
Index
Summary:The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Format:Mode of access: Internet via World Wide Web.
ISBN:9783110477597
9783110762488
9783110719550
9783110540550
9783110625264
9783110547757
ISSN:2509-7253 ;
DOI:10.1515/9783110477597
Access:restricted access
Hierarchical level:Monograph
Statement of Responsibility: Dengguo Feng.