0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.): Amit Vasudevan, Jonathan M. McCune, James Newsome Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.)
Amit Vasudevan, Jonathan M. McCune, James Newsome
R1,413 Discovery Miles 14 130 Ships in 10 - 15 working days

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

Bootstrapping Trust in Modern Computers (Paperback, Edition.): Bryan Parno, Jonathan M. McCune, Adrian Perrig Bootstrapping Trust in Modern Computers (Paperback, Edition.)
Bryan Parno, Jonathan M. McCune, Adrian Perrig
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Midnights
Taylor Swift CD R394 Discovery Miles 3 940
By Way Of Deception
Amir Tsarfati, Steve Yohn Paperback  (1)
R250 R185 Discovery Miles 1 850
Morgan
Kate Mara, Jennifer Jason Leigh, … Blu-ray disc  (1)
R67 Discovery Miles 670
Dunlop Pro Padel Balls (Green)(Pack of…
R199 R165 Discovery Miles 1 650
Higher
Michael Buble CD  (1)
R459 Discovery Miles 4 590
Luca Distressed Peak Cap (Khaki)
R249 Discovery Miles 2 490
Sky Guide Southern Africa 2025 - An…
Astronomical Handbook for SA Paperback R180 R139 Discovery Miles 1 390
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R31 Discovery Miles 310
Efekto Garden Gun - Ready-to-use…
R100 Discovery Miles 1 000
Sony NEW Playstation Dualshock 4 v2…
 (22)
R1,428 Discovery Miles 14 280

 

Partners