0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.): Amit Vasudevan, Jonathan M. McCune, James Newsome Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.)
Amit Vasudevan, Jonathan M. McCune, James Newsome
R1,356 Discovery Miles 13 560 Ships in 18 - 22 working days

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

Bootstrapping Trust in Modern Computers (Paperback, Edition.): Bryan Parno, Jonathan M. McCune, Adrian Perrig Bootstrapping Trust in Modern Computers (Paperback, Edition.)
Bryan Parno, Jonathan M. McCune, Adrian Perrig
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Nasty Women Talk Back - Feminist Essays…
Joy Watson Paperback  (2)
R251 Discovery Miles 2 510
Township Violence And The End Of…
Gary Kynoch Paperback R350 R323 Discovery Miles 3 230
God's Forever Family - The Jesus People…
Larry Eskridge Hardcover R1,399 Discovery Miles 13 990
Lollards And Their Books
Anne Hudson Hardcover R5,588 Discovery Miles 55 880
Evangelical vs. Liberal - The Clash of…
James K. Wellman Hardcover R3,498 Discovery Miles 34 980
Prophetic Integrity - Aligning Our Words…
R.T. Kendall Paperback R420 R379 Discovery Miles 3 790
Stellenbosch: Murder Town - Two Decades…
Julian Jansen Paperback R340 R304 Discovery Miles 3 040
Selling the Old-time Religion - American…
Douglas Abrams Hardcover R1,233 Discovery Miles 12 330
The Death Of Democracy - Hitler's Rise…
Benjamin Carter Hett Paperback  (1)
R313 R284 Discovery Miles 2 840
The Emergence of Liberty in the Modern…
Douglas F. Kelly Paperback R766 R665 Discovery Miles 6 650

 

Partners