Muutke küpsiste eelistusi

E-raamat: Trust and Trustworthy Computing: 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings

Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016.The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year"s research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year"s research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs.

Anonymous Attestation Using the Strong Diffe Hellman Assumption Revisited.- Practical Signing-Right Revocation.- Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness.- Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices.- Controversy in trust networks.- Enabling Key Migration Between Non-Compatible TPM Versions.- Bundling Evidence for Layered Attestation.- An arbiter PUF secured by remote random reconfigurations of an FPGA.
Anonymous Attestation Using the Strong Diffe Hellman Assumption
Revisited.- Practical Signing-Right Revocation.- Sensor Captchas: On the
Usability of Instrumenting Hardware Sensors to Prove Liveliness.- Runtime
Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices.-
Controversy in trust networks.- Enabling Key Migration Between Non-Compatible
TPM Versions.- Bundling Evidence for Layered Attestation.- An arbiter PUF
secured by remote random reconfigurations of an FPGA.