Trusted Computing Principles and Applications
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.
Gespeichert in:
| 1. Verfasser: | |
|---|---|
| Format: | E-Book |
| Sprache: | Englisch |
| Veröffentlicht: |
Germany
De Gruyter
2017
Walter de Gruyter GmbH |
| Ausgabe: | 1 |
| Schriftenreihe: | Advances in Computer Science |
| Schlagworte: | |
| ISBN: | 9783110477597, 3110477599, 3110476045, 9783110476040 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Zusammenfassung: | The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. |
|---|---|
| ISBN: | 9783110477597 3110477599 3110476045 9783110476040 |
| DOI: | 10.1515/9783110477597 |

