Trusted Systems [recurso electrónico] : Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers / edited by Liqun Chen, Moti Yung.

Por: Chen, Liqun [editor.]Colaborador(es): Yung, Moti [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 6802Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Descripción: XIV, 362p. 73 illus. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642252839Tema(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Information Systems | Computer Science | Computer Communication Networks | Data Encryption | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Computers and Society | Systems and Data SecurityFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 004.6 Clasificación LoC:TK5105.5-5105.9Recursos en línea: Libro electrónicoTexto En: Springer eBooksResumen: This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2010, held in Beijing, China, in December 2010. The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos TK5105.5 -5105.9 (Browse shelf(Abre debajo)) 1 No para préstamo 376877-2001

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2010, held in Beijing, China, in December 2010. The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

19

Con tecnología Koha