Welcome to our book review site www.go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Detecting Peripheral-based Attacks on the Host Memory
  • Language: en
  • Pages: 118

Detecting Peripheral-based Attacks on the Host Memory

  • Type: Book
  • -
  • Published: 2014-12-27
  • -
  • Publisher: Springer

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. T...

Building the Information Society
  • Language: en
  • Pages: 739

Building the Information Society

  • Type: Book
  • -
  • Published: 2008-04-08
  • -
  • Publisher: Springer

In the context of the 18th IFIP World Computer Congress (WCC’04), and beside the traditional organization of conferences, workshops, tutorials and student forum, it was decided to identify a range of topics of dramatic interest for the building of the Information Society. This has been featured as the "Topical day/session" track of the WCC’04. Topical Sessions have been selected in order to present syntheses, latest developments and/or challenges in different business and technical areas. Building the Information Society provides a deep perspective on domains including: the semantic integration of heterogeneous data, virtual realities and new entertainment, fault tolerance for trustworth...

Computer Security - ESORICS 96
  • Language: en
  • Pages: 390

Computer Security - ESORICS 96

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96. The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

A Generic Fault-Tolerant Architecture for Real-Time Dependable Systems
  • Language: en
  • Pages: 249

A Generic Fault-Tolerant Architecture for Real-Time Dependable Systems

The design of computer systems to be embedded in critical real-time applications is a complex task. Such systems must not only guarantee to meet hard real-time deadlines imposed by their physical environment, they must guarantee to do so dependably, despite both physical faults (in hardware) and design faults (in hardware or software). A fault-tolerance approach is mandatory for these guarantees to be commensurate with the safety and reliability requirements of many life- and mission-critical applications. This book explains the motivations and the results of a collaborative project', whose objective was to significantly decrease the lifecycle costs of such fault tolerant systems. The end-us...

Smart Card Programming and Security
  • Language: en
  • Pages: 264

Smart Card Programming and Security

  • Type: Book
  • -
  • Published: 2003-08-06
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the Second International Conference on Research in Smart Cards, E-smart 2001, held in Cannes, France, in September 2001. The 20 revised full papers presented were carefully reviewed and selected from 38 submissions. Among the topics addressed are biometrics, cryptography and electronic signatures on smart card security, formal methods for smart card evaluation and certification, architectures for multi-applications and secure open platforms, and middleware for smart cards and novel applications of smart cards.

Predictably Dependable Computing Systems
  • Language: en
  • Pages: 592
Security and Trust Management
  • Language: en
  • Pages: 254

Security and Trust Management

This book constitutes the proceedings of the 21st International Workshop on Security and Trust Management, STM 2025, held in conjunction with the 30th European Symposium on Computer Security Research (ESORICS 2025), in Toulouse, France, during September 25–26, 2025. The 13 full papers presented in this book were carefully reviewed and selected from 26 submissions. They were organized in topical sections as follows: Identity Management, Authentication, Access Control & Formal Modeling; AI & Machine Learning for Security; Cybersecurity Strategies, Regulations, Privacy; Cryptography & Threat Analysis.

Communications and Multimedia Security
  • Language: en
  • Pages: 371

Communications and Multimedia Security

  • Type: Book
  • -
  • Published: 2005-09-27
  • -
  • Publisher: Springer

It is our great pleasure to present the proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), which was held in Salzburg on September 19 – 21, 2005.

Computer Security
  • Language: en
  • Pages: 486

Computer Security

  • Type: Book
  • -
  • Published: 2004
  • -
  • Publisher: Unknown

None

Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems
  • Language: en
  • Pages: 140

Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems

  • Type: Book
  • -
  • Published: 2003
  • -
  • Publisher: Unknown

None