Trusted Computing Principles and Applications

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.

Saved in:
Bibliographic Details
Main Author: Feng, Dengguo
Format: eBook
Language:English
Published: Germany De Gruyter 2017
Walter de Gruyter GmbH
Edition:1
Series:Advances in Computer Science
Subjects:
ISBN:9783110477597, 3110477599, 3110476045, 9783110476040
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Intro -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
  • References --
  • Contents --
  • 4. Trusted Software Stack --
  • Appendix A: Foundations of Cryptography --
  • Preface --
  • 1. Introduction --
  • Index
  • 6. Test and Evaluation of Trusted Computing --
  • 5. Trusted Computing Platform --
  • 3. Building Chain of Trust --
  • 7. Remote Attestation --
  • Frontmatter --
  • 2. Trusted Platform Module --
  • 8. Trust Network Connection --