0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.): Amit Vasudevan, Jonathan M. McCune, James Newsome Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.)
Amit Vasudevan, Jonathan M. McCune, James Newsome
R1,356 Discovery Miles 13 560 Ships in 18 - 22 working days

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

Bootstrapping Trust in Modern Computers (Paperback, Edition.): Bryan Parno, Jonathan M. McCune, Adrian Perrig Bootstrapping Trust in Modern Computers (Paperback, Edition.)
Bryan Parno, Jonathan M. McCune, Adrian Perrig
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Energy and Sustainability VIII
A. Tadeu Hardcover R2,489 Discovery Miles 24 890
Attractors and Higher Dimensions in…
Gennadiy Vladimirovich Zhizhin Hardcover R4,111 Discovery Miles 41 110
Dynamics of Bodies with Time-Variable…
Livija Cveticanin Hardcover R2,270 R1,855 Discovery Miles 18 550
Observed Dream Movement - Zone
J. Munro Hardcover R584 Discovery Miles 5 840
Concrete Structures in Earthquake
Thomas T.C. Hsu Hardcover R4,075 Discovery Miles 40 750
Contesting Conversion - Genealogy…
Matthew Thiessen Hardcover R2,873 Discovery Miles 28 730
Land In South Africa - Contested…
Khwezi Mabasa, Bulelwa Mabasa Paperback R1,838 Discovery Miles 18 380
Theory of Elasticity and Thermal…
M. Reza Eslami, Richard B. Hetnarski, … Hardcover R2,935 Discovery Miles 29 350
The Politics of Common Sense - How…
Deva R Woodly Hardcover R3,753 Discovery Miles 37 530
Dynamic Mechanical Analysis for Plastics…
Michael Sepe Hardcover R6,226 Discovery Miles 62 260

 

Partners