Trusted Computing Principles and Applications
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.
Saved in:
| Main Author: | |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Germany
De Gruyter
2017
Walter de Gruyter GmbH |
| Edition: | 1 |
| Series: | Advances in Computer Science |
| Subjects: | |
| ISBN: | 9783110477597, 3110477599, 3110476045, 9783110476040 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. |
|---|---|
| ISBN: | 9783110477597 3110477599 3110476045 9783110476040 |
| DOI: | 10.1515/9783110477597 |

