Loading…

Trusted Computing : Principles and Applications.

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Feng, Dengguo
Other Authors: Press, Tsinghua University
Format: Electronic eBook
Language:Inglés
Published: Berlin/Boston : De Gruyter, 2017.
Series:Advances in computer science.
Subjects:
Online Access:Texto completo
Table of Contents:
  • Intro; Preface; Contents; 1. Introduction; 2. Trusted Platform Module; 3. Building Chain of Trust; 4. Trusted Software Stack; 5. Trusted Computing Platform; 6. Test and Evaluation of Trusted Computing; 7. Remote Attestation; 8. Trust Network Connection; Appendix A: Foundations of Cryptography; References; Index.