wyszukanych pozycji: 8
Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
ISBN: 9783642398834 / Angielski / Miękka / 2013 / 406 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret...
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Secu...
|
|
cena:
195,87 zł |
Towards Hardware-Intrinsic Security: Foundations and Practice
ISBN: 9783642265785 / Angielski / Miękka / 2013 / 407 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitioners with backgrounds in physics, mathematics, cryptography, coding theory and processor theory.
Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitione...
|
|
cena:
587,67 zł |
Towards Hardware-Intrinsic Security: Foundations and Practice
ISBN: 9783642144516 / Angielski / Twarda / 2010 / 407 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security...
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of th...
|
|
cena:
587,67 zł |
Building Secure Defenses Against Code-Reuse Attacks
ISBN: 9783319255446 / Angielski / Miękka / 2015 / 74 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time... This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks an... |
|
cena:
195,87 zł |
The Continuing Arms Race: Code-Reuse Attacks and Defenses
ISBN: 9781970001839 / Angielski / Twarda / 2018 / 302 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. The authors explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.
Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up s...
|
|
cena:
551,42 zł |
The Continuing Arms Race: Code-Reuse Attacks and Defenses
ISBN: 9781970001808 / Angielski / Miękka / 2018 / 302 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. The authors explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.
Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up s...
|
|
cena:
441,07 zł |
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions
ISBN: 9783031012167 / Angielski / Miękka / 2015 / 92 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software...
Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., we...
|
|
cena:
109,66 zł |
Cryptology and Network Security: 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings
ISBN: 9783642354038 / Angielski / Miękka / 2012 / 311 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models.
This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Aus...
|
|
cena:
195,87 zł |