Trusted Computing - Challenges and Applications
First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings
Sorozatcím: Lecture Notes in Computer Science; 4968;
-
12% KEDVEZMÉNY?
- A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
- Kiadói listaár EUR 68.56
-
28 435 Ft (27 081 Ft + 5% áfa)
Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.
- Kedvezmény(ek) 12% (cc. 3 412 Ft off)
- Kedvezményes ár 25 023 Ft (23 831 Ft + 5% áfa)
Iratkozzon fel most és részesüljön kedvezőbb árainkból!
Feliratkozom
28 435 Ft
Beszerezhetőség
A kiadónál véglegesen elfogyott, nem rendelhető. Érdemes újra keresni a címmel, hátha van újabb kiadás.
Why don't you give exact delivery time?
A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.
A termék adatai:
- Kiadás sorszáma 2008
- Kiadó Springer Verlag
- Megjelenés dátuma 2008. augusztus 4.
- Kötetek száma 1 pieces, Book
- ISBN 9783540689782
- Kötéstípus Puhakötés
- Terjedelem191 oldal
- Méret 235x155 mm
- Nyelv angol 0
Kategóriák
Hosszú leírás:
This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. The aim of the conference was to create a joint scienti?c and networking platform covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international research groups and projects in closely related ?elds. The organizers received 43 submissions from 17 countries. Each of the s- mittedpaperswasreviewedbythreereviewers.Basedonthesereviews13papers were selected as suitable for the conference and the authors were asked to p- sent their work. Further, six renowned speakers from academia, industry and the European Commission were invited for keynotes. The accepted papers are published in this volume together with one paper from Paul England, one of the invited speakers at TRUST 2008. TheconferencewassupportedbytheEuropeanCommissionviatheOpen-TC project (FP6 IST-027635), by the Austrian Research Promotion Agency (FFG) and by the city of Villach.
This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. The aim of the conference was to create a joint scienti?c and networking platform covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international research groups and projects in closely related ?elds. The organizers received 43 submissions from 17 countries. Each of the s- mittedpaperswasreviewedbythreereviewers.Basedonthesereviews13papers were selected as suitable for the conference and the authors were asked to p- sent their work. Further, six renowned speakers from academia, industry and the European Commission were invited for keynotes. The accepted papers are published in this volume together with one paper from Paul England, one of the invited speakers at TRUST 2008. TheconferencewassupportedbytheEuropeanCommissionviatheOpen-TC project (FP6 IST-027635), by the Austrian Research Promotion Agency (FFG) and by the city of Villach.
Tartalomjegyzék:
TRUST 2008.- Practical Techniques for Operating System Attestation.- TOCTOU, Traps, and Trusted Computing.- A Software-Based Trusted Platform Module Emulator.- Towards Trust Services for Language-Based Virtual Machines for Grid Computing.- Embedded Trusted Computing with Authenticated Non-volatile Memory.- The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks.- A Model for New Zealand's Identity Verification Service.- Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI.- Para-Virtualized TPM Sharing.- Slicing for Security of Code.- Trusted Computing Serving an Anonymity Service.- Combining Biometric Authentication with Privacy-Enhancing Technologies.- A New Direct Anonymous Attestation Scheme from Bilinear Maps.- On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA).
Több
Basic Grammar in Use Workbook with Answers
6 205 Ft
5 585 Ft
Advanced System Development/Feasibility Techniques
26 992 Ft
24 293 Ft