Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Surveys the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. The book examines the relevant concepts in computer architecture and cryptography, and then surveys attack vectors and existing processor systems claiming security for remote computation and/or software isolation.
Surveys the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. This two part work advocates a principled, transparent approach to system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable.
Non-Boolean Computing with Spintronic Devices explores the latest research areas which employ spintronic devices for non-Boolean computing purposes. It surveys the research to date and is an ideal reference for anyone interested in how the field is developing.
Error-Efficient Computing Systems explores techniques to make computing systems faster or more energy-efficient by allowing them to make controlled errors. It is intended for anyone interested in a holistic summary of the theory, practice, and history of making computing systems more efficient by trading errors for improved efficiency.
Helps put contract-based design in perspective. Contracts are precisely defined and characterized so that they can be used in design methodologies with no ambiguity.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.