Amazon cover image
Image from Amazon.com

Trusted systems : 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised selected papers / Moti Yung, Jianbiao Zhang, Zhen Yang (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 9565. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham : Springer, 2016Description: 1 online resource (xii, 235 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319315508
  • 3319315501
  • 3319315498
  • 9783319315492
Other title:
  • INTRUST 2015
Subject(s): Genre/Form: Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 I58 2015eb
Online resources:
Contents:
Aspects of trusted computing systems -- Trusted modules -- Platforms -- Networks, services and applications -- Encryptions and signatures -- Security model -- Trusted technologies -- Software and system security.
Summary: This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have been carefully reviewed and selected from 29 submissions. They are devoted to all aspects of trusted computing systems, including trusted modules, platforms; networks, services and applications. The papers are organized in the following sections: encryptions and signatures; security model; trusted technologies; software and system security.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and author index.

Online resource; title from PDF title page (SpringerLink, viewed March 28, 2016).

Aspects of trusted computing systems -- Trusted modules -- Platforms -- Networks, services and applications -- Encryptions and signatures -- Security model -- Trusted technologies -- Software and system security.

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have been carefully reviewed and selected from 29 submissions. They are devoted to all aspects of trusted computing systems, including trusted modules, platforms; networks, services and applications. The papers are organized in the following sections: encryptions and signatures; security model; trusted technologies; software and system security.

English.

Powered by Koha