Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Surveys the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. The book examines the relevant concepts in computer architecture and cryptography, and then surveys attack vectors and existing processor systems claiming security for remote computation and/or software isolation.
Surveys the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. This two part work advocates a principled, transparent approach to system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable.
Non-Boolean Computing with Spintronic Devices explores the latest research areas which employ spintronic devices for non-Boolean computing purposes. It surveys the research to date and is an ideal reference for anyone interested in how the field is developing.
Error-Efficient Computing Systems explores techniques to make computing systems faster or more energy-efficient by allowing them to make controlled errors. It is intended for anyone interested in a holistic summary of the theory, practice, and history of making computing systems more efficient by trading errors for improved efficiency.
Helps put contract-based design in perspective. Contracts are precisely defined and characterized so that they can be used in design methodologies with no ambiguity.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.