Trusted Computing Principles and Applications

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.

Saved in:
Bibliographic Details
Main Author: Feng, Dengguo
Format: eBook
Language:English
Published: Germany De Gruyter 2017
Walter de Gruyter GmbH
Edition:1
Series:Advances in Computer Science
Subjects:
ISBN:9783110477597, 3110477599, 3110476045, 9783110476040
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.
ISBN:9783110477597
3110477599
3110476045
9783110476040
DOI:10.1515/9783110477597