Book description
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Table of contents
- Cover
- Title Page
- Copyright
- Contents
- 1 Introduction
- 2 Trusted Platform Module
- 3 Building Chain of Trust
- 4 Trusted Software Stack
- 5 Trusted Computing Platform
- 6 Test and Evaluation of Trusted Computing
- 7 Remote Attestation
- 8 Trust Network Connection
- Appendix A: Foundations of Cryptography
- References
- Index
Product information
- Title: Trusted Computing
- Author(s):
- Release date: December 2017
- Publisher(s): De Gruyter
- ISBN: 9783110476095
You might also like
book
Intel® Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters
"This book is a must have resource guide for anyone who wants to ... implement TXT …
book
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable Every year, computer security …
book
Mathematik, 12th Edition
Das Buch beinhaltet die wichtigsten mathematischen Konzepte und Methoden für ein erfolgreiches Studium der Betriebs- oder …
book
Wissenschaftliche Arbeiten schreiben - Praktischer Leitfaden mit über 100 Software-Tipps, 2. Auflage
Alle Grundlagen zum Schreiben wissenschaftlicher Arbeiten Methoden zur Selbstorganisation und Zeitplanung sowie Strategien für unterschiedliche Schreibtypen …