Trusted Computing and Information Security

Trusted Computing and Information Security
Author : Huanguo Zhang
Publisher : Springer
Total Pages : 410
Release : 2019-01-08
ISBN 10 : 9789811359132
ISBN 13 : 981135913X
Language : EN, FR, DE, ES & NL

Trusted Computing and Information Security Book Description:

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018. The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.

Trusted Computing and Information Security
Language: en
Pages: 410
Authors: Huanguo Zhang
Categories: Computers
Type: BOOK - Published: 2019-01-08 - Publisher: Springer

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in Oct
Trusted Computing and Information Security
Language: en
Pages: 356
Authors: Weili Han
Categories: Computers
Type: BOOK - Published: 2020-02-19 - Publisher: Springer Nature

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in
Trusted Computing and Information Security
Language: en
Pages: 410
Authors: Ming Xu
Categories: Computers
Type: BOOK - Published: 2017-11-22 - Publisher: Springer

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China
Network Computing and Information Security
Language: en
Pages: 829
Authors: Jingsheng Lei
Categories: Computers
Type: BOOK - Published: 2013-11-19 - Publisher: Springer

This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China,
Computer and Information Security Handbook
Language: en
Pages: 928
Authors: John R. Vacca
Categories: Computers
Type: BOOK - Published: 2009-05-04 - Publisher: Morgan Kaufmann

Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure
Collaborative Computer Security and Trust Management
Language: en
Pages: 317
Authors: Seigneur, Jean-Marc
Categories: Business & Economics
Type: BOOK - Published: 2009-12-31 - Publisher: IGI Global

"This book combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field"--Provided by publishe
Information Security
Language: en
Pages: 620
Authors: Dennis Longley
Categories: Computers
Type: BOOK - Published: 1992-06-18 - Publisher: Springer

Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described. The
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems
Language: en
Pages: 263
Authors: Damien Sauveron
Categories: Business & Economics
Type: BOOK - Published: 2007-04-25 - Publisher: Springer Science & Business Media

This volume constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices: S
Trusted Computing
Language: en
Pages: 311
Authors: Dengguo Feng
Categories: Computers
Type: BOOK - Published: 2017-12-18 - Publisher: Walter de Gruyter GmbH & Co KG

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses th
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
Language: en
Pages: 458
Authors: Knapp, Kenneth J.
Categories: Computers
Type: BOOK - Published: 2009-04-30 - Publisher: IGI Global

"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by p