Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

ISBN-10:
9811070792
ISBN-13:
9789811070792
Pub. Date:
12/29/2017
Publisher:
Springer Nature Singapore
ISBN-10:
9811070792
ISBN-13:
9789811070792
Pub. Date:
12/29/2017
Publisher:
Springer Nature Singapore
Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017.

The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.


Product Details

ISBN-13: 9789811070792
Publisher: Springer Nature Singapore
Publication date: 12/29/2017
Series: Communications in Computer and Information Science , #704
Edition description: 1st ed. 2017
Pages: 410
Product dimensions: 6.10(w) x 9.25(h) x (d)

Table of Contents

Theory of trusted computing, trustworthy software.- Infrastructure of trusted computing, application and evaluation of trusted computing.- Network security and communication security.- Theory and technology of cryptographic techniques.- Information content security.- System security for mobile network and IoT systems, industrial control and embedded systems.- Security for Cloud computing, virtualization systems and big data.
From the B&N Reads Blog

Customer Reviews