Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Verlag: Morgan & Claypool Publishers, 2015
ISBN 10: 162705734X ISBN 13: 9781627057349
Sprache: Englisch
Anbieter: Our Kind Of Books, Liphook, Vereinigtes Königreich
EUR 11,66
Anzahl: 1 verfügbar
In den WarenkorbSoft cover. Zustand: As New. This book has been in storage since publication and is unread. Hence the description as new .
EUR 42,21
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 170 Illus.
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
EUR 72,61
Anzahl: 15 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Verlag: Vieweg+Teubner Verlag, Vieweg+Teubner Verlag Mai 2009, 2009
ISBN 10: 383480794X ISBN 13: 9783834807946
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware Springer Vieweg in Springer Science + Business Media, Abraham-Lincoln-Straße 46, 65189 Wiesbaden 240 pp. Englisch.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering.
Verlag: Springer-Verlag New York Inc, 2008
ISBN 10: 3540883525 ISBN 13: 9783540883524
Sprache: Englisch
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 76,77
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 153 pages. 9.00x6.00x0.25 inches. In Stock.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 81,04
Anzahl: 1 verfügbar
In den WarenkorbZustand: Used. pp. x + 191.
Verlag: Springer, Berlin|Springer International Publishing|Morgan & Claypool|Springer, 2014
ISBN 10: 3031012135 ISBN 13: 9783031012136
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
Zustand: New. Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. .
Verlag: Springer-Verlag New York Inc, 2014
ISBN 10: 331913065X ISBN 13: 9783319130651
Sprache: Englisch
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 77,30
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 2014 edition. 214 pages. 9.00x6.00x0.50 inches. In Stock.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Future of Trust in Computing | Proceedings of the First International Conference Future of Trust in Computing 2008 | David Grawrock (u. a.) | Taschenbuch | Einband - flex.(Paperback) | Englisch | 2009 | Vieweg & Teubner | EAN 9783834807946 | Verantwortliche Person für die EU: Vieweg+Teubner Verlag, Abraham-Lincoln-Str. 46, 65189 Wiesbaden, productsafety[at]springernature[dot]com | Anbieter: preigu.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 78,87
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 277 pages. 9.21x6.14x0.63 inches. In Stock.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 78,92
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 2012 edition. 327 pages. 9.00x6.10x0.80 inches. In Stock.
Verlag: Springer-Verlag New York Inc, 2015
ISBN 10: 3319255444 ISBN 13: 9783319255446
Sprache: Englisch
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 75,32
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 84 pages. 9.00x6.00x0.25 inches. In Stock.
Verlag: Springer International Publishing, 2015
ISBN 10: 303101216X ISBN 13: 9783031012167
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software can never ensure their own integrity and trustworthiness while resource-constraints and economic factors often prevent the integration of sophisticated security hardware and cryptographic co-processors. In this context, Physically Unclonable Functions (PUFs) are an emerging and promising technology to establish trust in embedded systems with minimal hardware requirements. This book explores the design of trusted embedded systems based on PUFs. Specifically, it focuses on the integration of PUFs into secure and efficient cryptographic protocols that are suitable for a variety of embedded systems. It exemplarily discusses how PUFs can be integrated into lightweight device authentication and attestation schemes, which are popular and highly relevant applications of PUFs in practice. For the integration of PUFs into secure cryptographic systems, it is essential to have a clear view of their properties. This book gives an overview of different approaches to evaluate the properties of PUF implementations and presents the results of a large scale security analysis of different PUF types implemented in application-specific integrated circuits (ASICs). To analyze the security of PUF-based schemes as is common in modern cryptography, it is necessary to have a security framework for PUFs and PUF-based systems. In this book, we give a flavor of the formal modeling of PUFs that is in its beginning and that is still undergoing further refinement in current research. The objective of this book is to provide a comprehensive overview of the current state of secure PUF-based cryptographic system design and the related challenges and limitations. Table of Contents: Preface / Introduction / Basics of Physically Unclonable Functions / Attacks on PUFs and PUF-based Systems / Advanced PUF Concepts / PUF Implementations and Evaluation / PUF-based Cryptographic Protocols / Security Model for PUF-based Systems / Conclusion / Terms and Abbreviations / Bibliography / Authors' Biographies.
Verlag: Springer-Verlag New York Inc, 2011
ISBN 10: 364221598X ISBN 13: 9783642215988
Sprache: Englisch
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 79,38
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 321 pages. 9.20x6.10x0.70 inches. In Stock.
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: Used. pp. x + 191.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 80,42
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 2013 edition. 421 pages. 9.25x6.10x0.96 inches. In Stock.
EUR 88,47
Anzahl: 15 verfügbar
In den WarenkorbHRD. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Verlag: Springer-Verlag New York Inc, 2010
ISBN 10: 3642138683 ISBN 13: 9783642138683
Sprache: Englisch
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 81,73
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 441 pages. 9.25x6.25x1.00 inches. In Stock.
Verlag: Springer International Publishing, 2015
ISBN 10: 3319255444 ISBN 13: 9783319255446
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
EUR 48,37
Anzahl: Mehr als 20 verfügbar
In den WarenkorbKartoniert / Broschiert. Zustand: New.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 93,76
Anzahl: 3 verfügbar
In den WarenkorbZustand: New. pp. 304.
Verlag: Morgan & Claypool Publishers, 2018
ISBN 10: 1970001801 ISBN 13: 9781970001808
Sprache: Englisch
Anbieter: Kennys Bookstore, Olney, MD, USA
EUR 96,45
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. 2018. paperback. . . . . . Books ship from the US and Ireland.
Verlag: Springer International Publishing, Springer International Publishing Nov 2014, 2014
ISBN 10: 331913065X ISBN 13: 9783319130651
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 224 pp. Englisch.
Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher.
Verlag: Springer Berlin Heidelberg, 2011
ISBN 10: 364221598X ISBN 13: 9783642215988
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
Zustand: New.
Verlag: Springer Berlin Heidelberg, 2010
ISBN 10: 3642138683 ISBN 13: 9783642138683
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
Zustand: New.
Verlag: Springer International Publishing, 2014
ISBN 10: 331913065X ISBN 13: 9783319130651
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.
Verlag: Springer International Publishing, Springer International Publishing Dez 2015, 2015
ISBN 10: 3319255444 ISBN 13: 9783319255446
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book provides an in-depth look at return-oriented programming attacks.It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 84 pp. Englisch.