Trustworthy Computing and Services

International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers

Nonfiction, Computers, Advanced Computing, Information Technology, Networking & Communications, Computer Security, General Computing
Cover of the book Trustworthy Computing and Services by , Springer Berlin Heidelberg
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783662474013
Publisher: Springer Berlin Heidelberg Publication: June 19, 2015
Imprint: Springer Language: English
Author:
ISBN: 9783662474013
Publisher: Springer Berlin Heidelberg
Publication: June 19, 2015
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications.

More books from Springer Berlin Heidelberg

Cover of the book Ambulante Pflege von A bis Z by
Cover of the book Keratoconjunctivitis Sicca and Filamentary Keratopathy by
Cover of the book Zukunftsfragen des deutschen Steuerrechts II by
Cover of the book Sicherheitsgerichtete Echtzeitsysteme by
Cover of the book Updating in Headache by
Cover of the book Controversial Pain Syndromes of the Arm by
Cover of the book Matrix Information Geometry by
Cover of the book Stressbewältigungstraining für Erwachsene mit ADHS by
Cover of the book Cardiovascular MRI in Congenital Heart Disease by
Cover of the book Behavioral Lateralization in Vertebrates by
Cover of the book CSR und Geschäftsmodelle by
Cover of the book Interactions Between Biosphere, Atmosphere and Human Land Use in the Amazon Basin by
Cover of the book Einführung in die Technische Chemie by
Cover of the book Evidenzbasiertes Arbeiten in der Physio- und Ergotherapie by
Cover of the book Clinical Pharmacology in Psychiatry by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy