Sökt på: Böcker av ahmad-reza sadeghi
totalt 32 träffar
Trust and Trustworthy Computing
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June …
Building Secure Defenses Against Code-Reuse Attacks
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of …
Towards Hardware-Intrinsic Security
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from …
Applied Cryptography and Network Security
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. …
Future of Trust in Computing
Several constituencies are working on building and preserving users' trust in the digital economy through - are examining new behaviors associated with ubiquitous connectivity and …
Information Hiding
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. …
Physically Unclonable Functions (PUFs)
Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive …
Trusted Computing - Challenges and Applications
This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, …
Continuing Arms Race
As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each …
Financial Cryptography and Data Security
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at …
Mobile Platform Security
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are …
Building Secure Defenses Against Code-Reuse Attacks
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of …