• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Sadeghi, Ahmad-Reza » książki

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950560]
• Literatura piękna
 [1849509]

  więcej...
• Turystyka
 [71097]
• Informatyka
 [151150]
• Komiksy
 [35848]
• Encyklopedie
 [23178]
• Dziecięca
 [617388]
• Hobby
 [139064]
• AudioBooki
 [1657]
• Literatura faktu
 [228597]
• Muzyka CD
 [383]
• Słowniki
 [2855]
• Inne
 [445295]
• Kalendarze
 [1464]
• Podręczniki
 [167547]
• Poradniki
 [480102]
• Religia
 [510749]
• Czasopisma
 [516]
• Sport
 [61293]
• Sztuka
 [243352]
• CD, DVD, Video
 [3414]
• Technologie
 [219456]
• Zdrowie
 [101002]
• Książkowe Klimaty
 [124]
• Zabawki
 [2311]
• Puzzle, gry
 [3459]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8079]
Kategorie szczegółowe BISAC

Wyniki wyszukiwania:

wyszukanych pozycji: 8

Dostępność:
Kategoria:
Dostępny język:
Cena:
od:
do:
ilość na stronie:


 Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers Ahmad-Reza Sadeghi 9783642398834
Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers

ISBN: 9783642398834 / Angielski / Miękka / 2013 / 406 str.

ISBN: 9783642398834/Angielski/Miękka/2013/406 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Dostawa w 2026 r.)
Ahmad-Reza Sadeghi
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret...
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Secu...
cena: 200,77

 Towards Hardware-Intrinsic Security: Foundations and Practice Sadeghi, Ahmad-Reza 9783642144516
Towards Hardware-Intrinsic Security: Foundations and Practice

ISBN: 9783642144516 / Angielski / Twarda / 2010 / 407 str.

ISBN: 9783642144516/Angielski/Twarda/2010/407 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Dostawa w 2026 r.)
Ahmad-Reza Sadeghi; David Naccache; Pim Tuyls
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security...
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of th...
cena: 602,40

 Towards Hardware-Intrinsic Security: Foundations and Practice Sadeghi, Ahmad-Reza 9783642265785
Towards Hardware-Intrinsic Security: Foundations and Practice

ISBN: 9783642265785 / Angielski / Miękka / 2013 / 407 str.

ISBN: 9783642265785/Angielski/Miękka/2013/407 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Dostawa w 2026 r.)
Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitioners with backgrounds in physics, mathematics, cryptography, coding theory and processor theory.
Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitione...
cena: 602,40

 Building Secure Defenses Against Code-Reuse Attacks Lucas Davi Ahmad-Reza Sadeghi 9783319255446
Building Secure Defenses Against Code-Reuse Attacks

ISBN: 9783319255446 / Angielski / Miękka / 2015 / 74 str.

ISBN: 9783319255446/Angielski/Miękka/2015/74 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Dostawa w 2026 r.)
Lucas Davi; Ahmad-Reza Sadeghi

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time...

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks an...

cena: 200,77

 The Continuing Arms Race: Code-Reuse Attacks and Defenses Per Larsen Ahmad-Reza Sadeghi 9781970001839
The Continuing Arms Race: Code-Reuse Attacks and Defenses

ISBN: 9781970001839 / Angielski / Twarda / 2018 / 302 str.

ISBN: 9781970001839/Angielski/Twarda/2018/302 str.

Termin realizacji zamówienia: ok. 30 dni roboczych (Dostawa w 2026 r.)
Per Larsen; Ahmad-Reza Sadeghi
Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. The authors explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.
Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up s...
cena: 412,07

 The Continuing Arms Race: Code-Reuse Attacks and Defenses Per Larsen Ahmad-Reza Sadeghi 9781970001808
The Continuing Arms Race: Code-Reuse Attacks and Defenses

ISBN: 9781970001808 / Angielski / Miękka / 2018 / 302 str.

ISBN: 9781970001808/Angielski/Miękka/2018/302 str.

Termin realizacji zamówienia: ok. 30 dni roboczych (Dostawa w 2026 r.)
Per Larsen; Ahmad-Reza Sadeghi
Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. The authors explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.
Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up s...
cena: 334,50

 Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions Christian Wachsmann Ahmad-Reza Sadeghi  9783031012167
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

ISBN: 9783031012167 / Angielski / Miękka / 2015 / 92 str.

ISBN: 9783031012167/Angielski/Miękka/2015/92 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Dostawa w 2026 r.)
Christian Wachsmann;Ahmad-Reza Sadeghi
Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software...
Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., we...
cena: 112,41

 Cryptology and Network Security: 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis 9783642354038
Cryptology and Network Security: 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings

ISBN: 9783642354038 / Angielski / Miękka / 2012 / 311 str.

ISBN: 9783642354038/Angielski/Miękka/2012/311 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Dostawa w 2026 r.)
Josef Pieprzyk;Ahmad-Reza Sadeghi;Mark Manulis
This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models.
This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Aus...
cena: 200,77


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia