0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.): Amit Vasudevan, Jonathan M. McCune, James Newsome Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.)
Amit Vasudevan, Jonathan M. McCune, James Newsome
R1,465 Discovery Miles 14 650 Ships in 10 - 15 working days

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

Bootstrapping Trust in Modern Computers (Paperback, Edition.): Bryan Parno, Jonathan M. McCune, Adrian Perrig Bootstrapping Trust in Modern Computers (Paperback, Edition.)
Bryan Parno, Jonathan M. McCune, Adrian Perrig
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Empire Of Pain - The Secret History of…
Patrick Radden Keefe Paperback R385 R349 Discovery Miles 3 490
Maigret - Season 1
Rowan Atkinson, Shaun Dingwall, … DVD  (5)
R271 Discovery Miles 2 710
I. C. S. Reference Library: Types of…
International Correspondence Schools Paperback R639 Discovery Miles 6 390
Mokgomana - The Life Of John Kgoana…
Peter Delius, Daniel Sher Paperback R260 R240 Discovery Miles 2 400
The Land and the Book - Or, Biblical…
William McClure Thomson Paperback R789 Discovery Miles 7 890
Epic Land - Namibia Exposed
Amy Schoeman Hardcover R600 Discovery Miles 6 000
Intel Core i9-11900 processor 2.5 GHz 16…
R12,887 R10,912 Discovery Miles 109 120
DeepCool RGB Colour LED Lighting Strip…
 (11)
R249 R234 Discovery Miles 2 340
Utopias and Utopians - An Historical…
Richard C Trahair Hardcover R2,515 Discovery Miles 25 150
Lian-li DK-Q1H Tall ATX Aluminium…
R8,594 Discovery Miles 85 940

 

Partners