Amazon cover image
Image from Amazon.com

Trusted Systems [electronic resource] : 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers / edited by Moti Yung, Jianbiao Zhang, Zhen Yang.

Contributor(s): Material type: TextTextSeries: Security and Cryptology ; 9565 | Lecture Notes in Computer Science ; 9565Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Edition: 1st ed. 2016Description: XII, 235 p. 55 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319315508
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 004.0151 23
LOC classification:
  • QA76.9.M35
Online resources:
Contents:
Aspects of trusted computing systems -- Trusted modules -- Platforms -- Networks, services and applications -- Encryptions and signatures -- Security model -- Trusted technologies -- Software and system security.
In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have been carefully reviewed and selected from 29 submissions. They are devoted to all aspects of trusted computing systems, including trusted modules, platforms; networks, services and applications. The papers are organized in the following sections: encryptions and signatures; security model; trusted technologies; software and system security.
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library IMSc Library Link to resource Available EBK15184

Aspects of trusted computing systems -- Trusted modules -- Platforms -- Networks, services and applications -- Encryptions and signatures -- Security model -- Trusted technologies -- Software and system security.

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have been carefully reviewed and selected from 29 submissions. They are devoted to all aspects of trusted computing systems, including trusted modules, platforms; networks, services and applications. The papers are organized in the following sections: encryptions and signatures; security model; trusted technologies; software and system security.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India