Trusted Computing and Information Security

11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Trusted Computing and Information Security by , Springer Singapore
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9789811070808
Publisher: Springer Singapore Publication: November 22, 2017
Imprint: Springer Language: English
Author:
ISBN: 9789811070808
Publisher: Springer Singapore
Publication: November 22, 2017
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017.

The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017.

The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.

More books from Springer Singapore

Cover of the book Mineral Exploration: Practical Application by
Cover of the book Collaborative Learner Autonomy by
Cover of the book A Guidebook for Today's Asian Investor by
Cover of the book Innovation and IPRs in China and India by
Cover of the book Proceedings of GeoShanghai 2018 International Conference: Ground Improvement and Geosynthetics by
Cover of the book Medicinal Plants and Fungi: Recent Advances in Research and Development by
Cover of the book Biochemistry and Cell Biology of Ageing: Part I Biomedical Science by
Cover of the book Computational Intelligence and Intelligent Systems by
Cover of the book Minister of Finance Incorporated by
Cover of the book Blast Mitigation Strategies in Marine Composite and Sandwich Structures by
Cover of the book Stereo Operative Atlas of Micro Ear Surgery by
Cover of the book 21st Century Maritime Silk Road: Construction of Remote Islands and Reefs by
Cover of the book Proceedings of the Institute of Industrial Engineers Asian Conference 2013 by
Cover of the book Applications of Artificial Intelligence Techniques in Engineering by
Cover of the book Transactions on Intelligent Welding Manufacturing by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy