Trusted Computing Platforms Design and Applications /
How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial efforts have advanced the notion of a "trusted computing platform" as a building block. Through a conspiracy of hardwar...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Smith, Sean W. (Autor) |
Autor Corporativo: | SpringerLink (Online service) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings /
por: Gritzalis, Dimitris, et al.
Publicado: (2009) -
Computer Security in the 21st Century
Publicado: (2005) -
Moving Target Defense II Application of Game Theory and Adversarial Modeling /
Publicado: (2013) -
Dynamic Secrets in Communication Security
por: Xiao, Sheng, et al.
Publicado: (2014) -
Network Science and Cybersecurity
Publicado: (2014)