0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings... Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings (Paperback, 2013 ed.)
Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.

Mobile Platform Security (Paperback): N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena... Mobile Platform Security (Paperback)
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, …
R982 Discovery Miles 9 820 Ships in 18 - 22 working days

Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Chicago Boxing
J. J. Johnston, Sean Curtin, … Hardcover R719 R638 Discovery Miles 6 380
The Pen, the Palm, and the Pulpit
John Stoughton Paperback R378 Discovery Miles 3 780
Major Tech Gas Soldering Iron Kit…
R1,352 Discovery Miles 13 520
Bare-Knuckle Boxer's Companion…
David Lindholm, Ulf Karlsson Hardcover R734 Discovery Miles 7 340
Day Trading Made Easy 2022 - Beginner's…
Opensea Hardcover R1,031 R890 Discovery Miles 8 900
My Life and Battles - By Jack Johnson
Christopher Rivers Hardcover R2,045 Discovery Miles 20 450
The Price Of Money - How To Prosper In A…
Rob Dix Paperback R438 Discovery Miles 4 380
Value Based and Intelligent Asset…
Adolfo Crespo Marquez, Marco Macchi, … Hardcover R2,943 Discovery Miles 29 430
Advances in ERCP, An Issue of…
Adam Slivka Hardcover R1,692 Discovery Miles 16 920
Industrial Noise Control and Acoustics
Randall F. Barron Hardcover R9,698 Discovery Miles 96 980

 

Partners