Security and Cryptology

Trusted Systems

First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings

Editors: Chen, Liqun, Yung, Moti (Eds.)

Free Preview
  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report
see more benefits

Buy this book

eBook 58,84 €
price for Spain (gross)
  • ISBN 978-3-642-14597-1
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover 72,79 €
price for Spain (gross)
  • ISBN 978-3-642-14596-4
  • Free shipping for individuals worldwide
  • Institutional customers should get in touch with their account manager
  • Covid-19 shipping restrictions
  • This title is currently reprinting. You can pre-order your copy now.
  • The final prices may differ from the prices shown due to specifics of VAT rules
About this book

This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.

Table of contents (16 chapters)

Table of contents (16 chapters)

Buy this book

eBook 58,84 €
price for Spain (gross)
  • ISBN 978-3-642-14597-1
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover 72,79 €
price for Spain (gross)
  • ISBN 978-3-642-14596-4
  • Free shipping for individuals worldwide
  • Institutional customers should get in touch with their account manager
  • Covid-19 shipping restrictions
  • This title is currently reprinting. You can pre-order your copy now.
  • The final prices may differ from the prices shown due to specifics of VAT rules
Loading...

Bibliographic Information

Bibliographic Information
Book Title
Trusted Systems
Book Subtitle
First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings
Editors
  • Liqun Chen
  • Moti Yung
Series Title
Security and Cryptology
Series Volume
6163
Copyright
2010
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-642-14597-1
DOI
10.1007/978-3-642-14597-1
Softcover ISBN
978-3-642-14596-4
Edition Number
1
Number of Pages
XIV, 263
Number of Illustrations
64 b/w illustrations
Topics