Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

eBook1st ed. 2017 (1st ed. 2017)

$41.49  $54.99 Save 25% Current price is $41.49, Original price is $54.99. You Save 25%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017.

The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.


Product Details

ISBN-13: 9789811070808
Publisher: Springer-Verlag New York, LLC
Publication date: 11/22/2017
Series: Communications in Computer and Information Science , #704
Sold by: Barnes & Noble
Format: eBook
File size: 8 MB

Table of Contents

Theory of trusted computing, trustworthy software.- Infrastructure of trusted computing, application and evaluation of trusted computing.- Network security and communication security.- Theory and technology of cryptographic techniques.- Information content security.- System security for mobile network and IoT systems, industrial control and embedded systems.- Security for Cloud computing, virtualization systems and big data.
From the B&N Reads Blog

Customer Reviews