feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    edoccha_BV049083959
    Format: 1 Online-Ressource.
    ISBN: 978-3-031-33386-6
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-3-031-33385-9
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-3-031-33388-0
    Language: English
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Author information: Tellenbach, Bernhard 1979-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949767382902882
    Format: 1 online resource (249 pages)
    Edition: 1st ed.
    ISBN: 9783031548277
    Note: Intro -- Foreword by Florian Schütz -- Foreword by Jan Kleijssen -- Preface -- Acknowledgments -- Contents -- List of Contributors -- Reviewers -- Acronyms -- Part I Introduction -- 1 From Deep Neural Language Models to LLMs -- 1.1 What LLMs Are and What LLMs Are Not -- 1.2 Principles of LLMs -- 1.2.1 Deep Neural Language Models -- 1.2.2 Generative Deep Neural Language Models -- 1.2.3 Generating Text -- 1.2.4 Memorization vs Generalization -- 1.2.5 Effect of the Model and Training Dataset Size -- References -- 2 Adapting LLMs to Downstream Applications -- 2.1 Prompt Optimization -- 2.2 Pre-Prompting and Implicit Prompting -- 2.3 Model Coordination: Actor-Agents -- 2.4 Integration with Tools -- 2.5 Parameter-Efficient Fine-Tuning -- 2.6 Fine-Tuning -- 2.7 Further Pretraining -- 2.8 From-Scratch Re-Training -- 2.9 Domain-Specific Distillation -- References -- 3 Overview of Existing LLM Families -- 3.1 Introduction -- 3.2 Pre-Transformer LLMs -- 3.3 BERT and Friends -- 3.4 GPT Family Proper -- 3.5 Generative Autoregressors (GPT Alternatives) -- 3.6 Compute-Optimal Models -- 3.6.1 LLaMA Family -- 3.7 Full-Transformer/Sequence-to-Sequence Models -- 3.8 Multimodal and Mixture-of-Experts Models -- 3.8.1 Multimodal Visual LLMs -- 3.8.2 Pathways Language Model, PaLM -- 3.8.3 GPT-4 and BingChat -- References -- 4 Conversational Agents -- 4.1 Introduction -- 4.2 GPT Related Conversational Agents -- 4.3 Alternative Conversational Agent LLMs -- 4.3.1 Conversational Agents Without Auxiliary Capabilities -- 4.3.2 Conversational Agents With Auxiliary Capabilities -- 4.3.2.1 Models With Non-Knowledge Auxiliary Capabilities -- 4.4 Conclusion -- References -- 5 Fundamental Limitations of Generative LLMs -- 5.1 Introduction -- 5.2 Generative LLMs Cannot Be Factual -- 5.3 Generative LLMs With Auxiliary Tools Still Struggle To Be Factual. , 5.4 Generative LLMs Will Leak Private Information -- 5.5 Generative LLMs Have Trouble With Reasoning -- 5.6 Generative LLMs Forget Fast and Have a Short Attention Span -- 5.7 Generative LLMs Are Only Aware of What They Saw at Training -- 5.8 Generative LLMs Can Generate Highly Inappropriate Texts -- 5.9 Generative LLMs Learn and Perpetrate Societal Bias -- References -- 6 Tasks for LLMs and Their Evaluation -- 6.1 Introduction -- 6.2 Natural Language Tasks -- 6.2.1 Reading Comprehension -- 6.2.2 Question Answering -- 6.2.3 Common Sense Reasoning -- 6.2.4 Natural Language Generation -- 6.3 Conclusion -- References -- Part II LLMs in Cybersecurity -- 7 Private Information Leakage in LLMs -- 7.1 Introduction -- 7.2 Information Leakage -- 7.3 Extraction -- 7.4 Jailbreaking -- 7.5 Conclusions -- References -- 8 Phishing and Social Engineering in the Age of LLMs -- 8.1 LLMs in Phishing and Social Engineering -- 8.2 Case Study: Orchestrating Large-Scale Scam Campaigns -- 8.3 Case Study: Shā Zhū Pán Attacks -- References -- 9 Vulnerabilities Introduced by LLMs Through Code Suggestions -- 9.1 Introduction -- 9.2 Relationship Between LLMs and Code Security -- 9.2.1 Vulnerabilities and Risks Introduced by LLM-Generated Code -- 9.3 Mitigating Security Concerns With LLM-Generated Code -- 9.4 Conclusion and The Path Forward -- References -- 10 LLM Controls Execution Flow Hijacking -- 10.1 Faulting Controls: The Genesis of Execution Flow Hijacking -- 10.2 Unpacking Execution Flow: LLMs' Sensitivity to User-Provided Text -- 10.3 Examples of LLMs Execution Flow Attacks -- 10.4 Securing Uncertainty: Security Challenges in LLMs -- 10.5 Security by Design: Shielding Probabilistic Execution Flows -- References -- 11 LLM-Aided Social Media Influence Operations -- 11.1 Introduction -- 11.2 Salience of LLMs -- 11.3 Potential Impact -- 11.4 Mitigation -- References. , 12 Deep(er) Web Indexing with LLMs -- 12.1 Introduction -- 12.2 Innovation Through Integration of LLMs -- 12.3 Navigating Complexities: Challenges and Mitigation Strategies -- 12.3.1 Desired Behavior of LLM-Based Search Query Creation Tools -- 12.3.2 Engineering Challenges and Mitigations -- 12.3.2.1 Ethical and Security Concerns -- 12.3.2.2 Fidelity of Query Responses and Model Accuracy -- 12.3.2.3 Linguistic and Regulatory Variations -- 12.3.2.4 Handling Ambiguous Queries -- 12.4 Key Takeaways -- 12.5 Conclusion and Reflections -- References -- Part III Tracking and Forecasting Exposure -- 13 LLM Adoption Trends and Associated Risks -- 13.1 Introduction -- 13.2 In-Context Learning vs Fine-Tuning -- 13.3 Adoption Trends -- 13.3.1 LLM Agents -- 13.4 Potential Risks -- References -- 14 The Flow of Investments in the LLM Space -- 14.1 General Context: Investments in the Sectors of AI, ML, and Text Analytics -- 14.2 Discretionary Evidence -- 14.3 Future Work with Methods Already Applied to AI and ML -- References -- 15 Insurance Outlook for LLM-Induced Risk -- 15.1 General Context of Cyber Insurance -- 15.1.1 Cyber-Risk Insurance -- 15.1.2 Cybersecurity and Breaches Costs -- 15.2 Outlook for Estimating the Insurance Premia of LLMs Cyber Insurance -- References -- 16 Copyright-Related Risks in the Creation and Useof ML/AI Systems -- 16.1 Introduction -- 16.2 Concerns of Owners of Copyrighted Works -- 16.3 Concerns of Users Who Incorporate Content Generated by ML/AI Systems Into Their Creations -- 16.4 Mitigating the Risks -- References -- 17 Monitoring Emerging Trends in LLM Research -- 17.1 Introduction -- 17.2 Background -- 17.3 Data and Methods: Noun Extraction -- 17.4 Results -- 17.4.1 Domain Experts Validation and Interpretations -- 17.5 Discussion, Limitations and Further Research -- 17.6 Conclusion -- References -- Part IV Mitigation. , 18 Enhancing Security Awareness and Education for LLMs -- 18.1 Introduction -- 18.2 Security Landscape of LLMs -- 18.3 Foundations of LLM Security Education -- 18.4 The Role of Education in Sub-Areas of LLM Deployment and Development -- 18.5 Empowering Users Against Security Breaches and Risks -- 18.6 Advanced Security Training for LLM Users -- 18.7 Conclusion and the Path Forward -- References -- 19 Towards Privacy Preserving LLMs Training -- 19.1 Introduction -- 19.2 Dataset Pre-processing with Anonymization and De-duplication -- 19.3 Differential Privacy for Fine-Tuning Models -- 19.4 Differential Privacy for Deployed Models -- 19.5 Conclusions -- References -- 20 Adversarial Evasion on LLMs -- 20.1 Introduction -- 20.2 Evasion Attacks in Image Classification -- 20.3 Impact of Evasion Attacks on the Theory of Deep Learning -- 20.4 Evasion Attacks for Language Processing and Applicability to Large Language Models -- References -- 21 Robust and Private Federated Learning on LLMs -- 21.1 Introduction -- 21.1.1 Peculiar Challenges of LLMs -- 21.2 Robustness to Malicious Clients -- 21.3 Privacy Protection of Clients' Data -- 21.4 Synthesis of Robustness and Privacy -- 21.5 Concluding Remarks -- References -- 22 LLM Detectors -- 22.1 Introduction -- 22.2 LLMs' Salience -- 22.2.1 General Detectors -- 22.2.2 Specific Detectors -- 22.3 Potential Mitigation -- 22.3.1 Watermarking -- 22.3.2 DetectGPT -- 22.3.3 Retrieval Based -- 22.4 Mitigation -- References -- 23 On-Site Deployment of LLMs -- 23.1 Introduction -- 23.2 Open-Source Development -- 23.3 Technical Solution -- 23.3.1 Serving -- 23.3.2 Quantization -- 23.3.3 Energy Costs -- 23.4 Risk Assessment -- References -- 24 LLMs Red Teaming -- 24.1 History and Evolution of Red-Teaming Large Language Models -- 24.2 Making LLMs Misbehave -- 24.3 Attacks -- 24.3.1 Classes of Attacks on Large Language Models. , 24.3.1.1 Prompt-Level Attacks -- 24.3.1.2 Contextual Limitations: A Fundamental Weakness -- 24.3.1.3 Mechanisms of Distractor and Formatting Attacks -- 24.3.1.4 The Role of Social Engineering -- 24.3.1.5 Integration of Fuzzing and Automated Machine Learning Techniques for Scalability -- 24.4 Datasets -- 24.5 Defensive Mechanisms Against Manual and Automated Attacks on LLMs -- 24.6 The Future -- Appendix -- References -- 25 Standards for LLM Security -- 25.1 Introduction -- 25.2 The Cybersecurity Landscape -- 25.2.1 MITRE CVEs -- 25.2.2 CWE -- 25.2.3 MITRE ATT& -- CK and Cyber Kill Chain -- 25.3 Existing Standards -- 25.3.1 AI RMF Playbook -- 25.3.2 OWASP Top 10 for LLMs -- 25.3.3 AI Vulnerability Database -- 25.3.4 MITRE ATLAS -- 25.4 Looking Ahead -- References -- Part V Conclusion -- 26 Exploring the Dual Role of LLMs in Cybersecurity: Threats and Defenses -- 26.1 Introduction -- 26.2 LLM Vulnerabilities -- 26.2.1 Security Concerns -- 26.2.1.1 Data Leakage -- 26.2.1.2 Toxic Content -- 26.2.1.3 Disinformation -- 26.2.2 Attack Vectors -- 26.2.2.1 Backdoor Attacks -- 26.2.2.2 Prompt Injection Attacks -- 26.2.3 Testing LLMs -- 26.3 Code Creation Using LLMs -- 26.3.1 How Secure is LLM-Generated Code? -- 26.3.2 Generating Malware -- 26.4 Shielding with LLMs -- 26.5 Conclusion -- References -- 27 Towards Safe LLMs Integration -- 27.1 Introduction -- 27.2 The Attack Surface -- 27.3 Impact -- 27.4 Mitigation -- References.
    Additional Edition: Print version: Kucharavy, Andrei Large Language Models in Cybersecurity Cham : Springer International Publishing AG,c2024 ISBN 9783031548260
    Language: English
    Keywords: Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    edocfu_BV049083959
    Format: 1 Online-Ressource.
    ISBN: 978-3-031-33386-6
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-3-031-33385-9
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-3-031-33388-0
    Language: English
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Author information: Tellenbach, Bernhard 1979-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV049083959
    Format: 1 Online-Ressource
    ISBN: 9783031333866
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-3-031-33385-9
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-3-031-33388-0
    Language: English
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Author information: Tellenbach, Bernhard 1979-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almafu_BV049083959
    Format: 1 Online-Ressource.
    ISBN: 978-3-031-33386-6
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-3-031-33385-9
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-3-031-33388-0
    Language: English
    Keywords: Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Author information: Tellenbach, Bernhard 1979-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949560760202882
    Format: 1 online resource (253 pages)
    Edition: 1st ed. 2023.
    ISBN: 3-031-33386-1
    Content: This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption and data protection technologies and their global usage trends. The Swiss Confederation tasked the Cyber-Defence Campus (CYD Campus) to identify the 38 most relevant encryption and data protection technologies, analyze their expected evolution until 2025, and derive implications for the military, civil society, and economy sectors. Fifty experts from academia, government, and industry have contributed to this study and provided their viewpoints on the different technologies and trends. This comprehensive collection of factsheets provides a reference for organizations and individuals that need to elaborate coherent and efficient data protection and encryption strategies in the coming years. The 38 technologies have been sorted into five categories. First, encryption foundations represent the technologies used to create other encryption applications. Second, low-level applications represent the technologies that focus on micro functionalities. Third, high-level applications represent the technologies that focus on more abstract and macro functionalities. Fourth, data protection represents the technologies used to protect data without encrypting these data. Finally, use cases represent concrete ways the different technologies can be used together to create a working solution. The book serves as a guide for decision-making within administrations, government organizations, and industry. It will also be interesting for the tech-savvy board member or engineers looking to get an entry point into data protection topics. Last not least, the book will also be a valuable reading for anyone interested in data protection and encryption.
    Note: Intro -- Foreword by Quentin Ladetto -- Foreword by Florian Schütz -- Preface -- Acknowledgements -- Contents -- List of Contributors -- Part I Encryption Foundations -- 1 One-Time Pad -- 1.1 Introduction -- 1.2 Analysis -- 1.2.1 Definition -- 1.2.2 Trends -- 1.3 Consequences for Switzerland -- 1.3.1 Implementation Possibilities -- 1.4 Conclusion -- References -- 2 Symmetric Cryptography -- 2.1 Introduction -- 2.2 Analysis -- 2.2.1 Definition -- 2.2.2 Trends -- 2.3 Consequences for Switzerland -- 2.3.1 Implementation Possibilities -- 2.4 Conclusion -- References -- 3 Asymmetric Encryption -- 3.1 Introduction -- 3.2 Analysis -- 3.2.1 Definition -- 3.2.2 Trends -- 3.3 Consequences for Switzerland -- 3.3.1 Implementation Possibilities: Make or Buy -- 3.3.2 Variation and Recommendation -- 3.4 Conclusion -- References -- 4 Key Management -- 4.1 Introduction -- 4.2 Analysis -- 4.2.1 Definition -- 4.2.1.1 Key Creation -- 4.2.1.2 Key Storage -- 4.2.1.3 Key Distribution -- 4.2.1.4 Key Usage -- 4.2.2 Trends -- 4.3 Consequences for Switzerland -- 4.3.1 Implementation Possibilities: Make or Buy -- 4.3.2 Variations and Recommendation -- 4.4 Conclusion -- References -- 5 Hash Functions -- 5.1 Introduction -- 5.2 Analysis -- 5.2.1 Definition -- 5.2.2 Trends -- 5.3 Consequences for Switzerland -- 5.3.1 Implementation Possibilities -- 5.4 Conclusion -- References -- 6 Zero-Knowledge Proof -- 6.1 Introduction -- 6.2 Analysis -- 6.2.1 Definition -- 6.2.2 Trends -- 6.3 Consequences for Switzerland -- 6.3.1 Public Sector -- 6.3.2 Private Sector -- 6.3.3 Civil Society -- 6.3.4 Implementation Possibilities: Make or Buy -- 6.3.5 Variation and Recommendation -- 6.4 Conclusion -- References -- 7 Random Number Generator -- 7.1 Introduction -- 7.2 Analysis -- 7.2.1 Definition -- 7.2.2 Trends -- 7.3 Consequences for Switzerland. , 7.3.1 Implementation Possibilities: Make or Buy -- 7.3.2 Variation and Recommendation -- 7.4 Conclusion -- References -- 8 Homomorphic Encryption -- 8.1 Introduction -- 8.2 Definition and Analysis -- 8.2.1 Trends -- 8.3 Consequences for Switzerland -- 8.3.1 Implementation Possibilities: Make or Buy -- 8.3.2 Variations and Recommendation -- 8.4 Conclusion -- References -- 9 Quantum Key Distribution -- 9.1 Introduction -- 9.2 Analysis -- 9.2.1 Definition -- 9.2.2 Trends -- 9.3 Consequences for Switzerland -- 9.3.1 Implementation Possibilities: Make or Buy -- 9.3.2 Variations and Recommendation -- 9.4 Conclusion -- References -- 10 Post-quantum Cryptography -- 10.1 Introduction -- 10.2 Analysis -- 10.2.1 Definition -- 10.2.2 Trends -- 10.3 Consequences for Switzerland -- 10.3.1 Implementation Possibilities: Make or Buy -- 10.3.2 Variations and Recommendation -- 10.4 Conclusion -- References -- Part II Low-Level Applications -- 11 Functional Encryption -- 11.1 Introduction -- 11.2 Analysis -- 11.2.1 Definition -- 11.2.2 Trends -- 11.3 Consequences for Switzerland -- 11.3.1 Implementation Possibilities: Make or Buy -- 11.3.2 Variations and Recommendation -- 11.4 Conclusion -- References -- 12 Identity-Based Cryptography -- 12.1 Introduction -- 12.2 Analysis -- 12.2.1 Definition -- 12.2.2 Trends -- 12.3 Consequences for Switzerland -- 12.3.1 Implementation Possibilities: Make or Buy -- 12.3.2 Variations and Recommendation -- 12.4 Conclusion -- References -- 13 Multi-Party Threshold Cryptography -- 13.1 Introduction -- 13.2 Analysis -- 13.2.1 Definition -- 13.2.2 Trends -- 13.3 Consequences for Switzerland -- 13.3.1 Implementation Possibilities: Make or Buy -- 13.3.2 Variations and Recommendation -- 13.4 Conclusion -- References -- 14 Searchable Symmetric Encryption -- 14.1 Introduction -- 14.2 Analysis -- 14.2.1 Definition -- 14.2.2 Trends. , 14.3 Consequences for Switzerland -- 14.3.1 Implementation Possibilities: Make or Buy -- 14.3.2 Variations and Recommendation -- 14.4 Conclusion -- References -- 15 Digital Signature -- 15.1 Introduction -- 15.2 Analysis -- 15.2.1 Definition -- 15.2.2 Trends -- 15.3 Consequences for Switzerland -- 15.3.1 Implementation Possibilities: Make or Buy -- 15.3.1.1 Distinction from Electronic Signature -- 15.3.1.2 Code Signing -- 15.4 Conclusion -- References -- 16 Hardware Security Module -- 16.1 Introduction -- 16.2 Analysis -- 16.2.1 Definition -- 16.2.2 Trends -- 16.3 Consequences for Switzerland -- 16.3.1 Maturity -- 16.3.2 Recommendation and Options -- 16.4 Conclusion -- References -- 17 Secure Multi-Party Computation -- 17.1 Introduction -- 17.2 Analysis -- 17.2.1 Definition -- 17.2.2 Trends -- 17.3 Consequences for Switzerland -- 17.3.1 Implementation Possibilities: Make or Buy -- 17.3.2 Variations and Recommendation -- 17.4 Conclusion -- References -- Part III High-Level Applications -- 18 Trusted Execution Environment -- 18.1 Introduction -- 18.2 Analysis -- 18.2.1 Definition -- 18.2.2 Trends -- 18.2.2.1 Application on Mobile Phones -- 18.2.2.2 Security in Cloud Data Processing -- 18.2.2.3 Data Protection Laws -- 18.2.2.4 Cryptocurrency Usage -- 18.2.2.5 Demand -- 18.2.2.6 Actors -- 18.2.2.7 Research -- 18.3 Consequences for Switzerland -- 18.3.1 Maturity -- 18.3.1.1 Recommendations and Options -- 18.4 Conclusion -- References -- 19 Confidential Computing -- 19.1 Introduction -- 19.2 Analysis -- 19.2.1 Definition -- 19.2.2 Trends -- 19.3 Consequences for Switzerland -- 19.3.1 Implementation Possibilities: Make or Buy -- 19.4 Conclusion -- References -- 20 Hardware Acceleration -- 20.1 Introduction -- 20.2 Analysis -- 20.2.1 Definition -- 20.2.2 Trends -- 20.3 Consequences for Switzerland -- 20.3.1 Implementation Possibilities: Make or Buy. , 20.3.2 Variations and Recommendation -- 20.4 Conclusion -- References -- 21 Secure Operating System -- 21.1 Introduction -- 21.2 Analysis -- 21.2.1 Definition -- 21.2.2 Trends -- 21.3 Consequences for Switzerland -- 21.3.1 Implementation Possibilities: Make or Buy -- 21.4 Conclusion -- References -- 22 Biometrics -- 22.1 Introduction -- 22.2 Analysis -- 22.2.1 Definition -- 22.2.2 Trends -- 22.3 Consequences for Switzerland -- 22.3.1 Implementation Possibilities: Make or Buy -- 22.3.2 Variation and Recommendation -- 22.4 Conclusion -- References -- 23 Electronic Voting -- 23.1 Introduction -- 23.2 Analysis -- 23.2.1 Definition -- 23.2.2 Trends -- 23.3 Consequences for Switzerland -- 23.3.1 Implementation Possibilities: Make or Buy -- 23.3.2 Variations and Recommendation -- 23.4 Conclusion -- References -- 24 Data in Transit Security -- 24.1 Introduction -- 24.2 Analysis -- 24.2.1 Definition -- 24.2.2 Trends -- 24.3 Consequences for Switzerland -- 24.3.1 Implementation Possibilities: Make or Buy -- 24.4 Conclusion -- References -- 25 Blockchain -- 25.1 Introduction -- 25.2 Analysis -- 25.2.1 Definition -- 25.2.2 Trends -- 25.3 Consequences for Switzerland -- 25.3.1 Implementation Possibilities: Make or Buy -- 25.3.2 Use Cases -- 25.4 Conclusion -- References -- 26 Tunneling and VPN -- 26.1 Introduction -- 26.2 Analysis -- 26.2.1 Definition -- 26.2.2 Trends -- 26.3 Consequences for Switzerland -- 26.3.1 Implementation Possibilities: Make or Buy -- 26.3.2 Variation and Recommendation -- 26.4 Conclusion -- References -- Part IV Data Protection -- 27 Differential Privacy -- 27.1 Introduction -- 27.2 Analysis -- 27.2.1 Definition -- 27.2.2 Trends -- 27.3 Consequences for Switzerland -- 27.3.1 Implementation Possibilities: Make or Buy -- 27.4 Conclusion -- References -- 28 Digital Rights Management -- 28.1 Introduction -- 28.2 Analysis -- 28.2.1 Definition. , 28.2.2 Trends -- 28.3 Consequences for Switzerland -- 28.3.1 Implementation Possibilities: Make or Buy -- 28.3.2 Variation and Recommendation -- 28.4 Conclusion -- References -- 29 Authentication -- 29.1 Introduction -- 29.2 Analysis -- 29.2.1 Definition -- 29.2.2 Trends -- 29.3 Consequences for Switzerland -- 29.3.1 Implementation Possibilities: Make or Buy -- 29.4 Conclusion -- References -- Part V Use-Cases -- 30 Secure Media -- 30.1 Introduction -- 30.2 Analysis -- 30.2.1 Definition -- 30.2.2 Trends -- 30.3 Consequences for Switzerland -- 30.3.1 Implementation Possibilities: Make or Buy -- 30.3.2 Variations and Recommendation -- 30.4 Conclusion -- References -- 31 Secure Positioning and Localization -- 31.1 Introduction -- 31.2 Analysis -- 31.2.1 Definition -- 31.2.2 Trends -- 31.3 Consequences for Switzerland -- 31.3.1 Implementation Possibilities: Make or Buy -- 31.3.2 Variations and Recommendation -- 31.4 Conclusion -- References -- 32 Secure Payment -- 32.1 Introduction -- 32.2 Analysis -- 32.2.1 Definition -- 32.2.2 Trends -- 32.3 Consequences for Switzerland -- 32.3.1 Implementation Possibilities: Make or Buy -- 32.3.2 Variation and Recommendation -- 32.4 Conclusion -- References -- 33 Disk, File and Database Encryption -- 33.1 Introduction -- 33.2 Analysis -- 33.3 Definition -- 33.3.1 Full Disk Encryption (FDE) -- 33.3.2 File-Based Encryption (FBE) -- 33.3.3 Manual File Encryption -- 33.3.4 Database Encryption (DBE) -- 33.4 Security Considerations -- 33.4.1 Encryption Algorithms -- 33.4.2 Key Management -- 33.4.3 Coercion -- 33.5 OS Examples -- 33.6 Trends -- 33.7 Consequences for Switzerland -- 33.8 Conclusion -- References -- 34 WEB3 -- 34.1 Introduction -- 34.2 Analysis -- 34.2.1 Definition -- 34.2.2 Technologies -- 34.2.3 Risks -- 34.2.4 Trends -- 34.3 Consequences for Switzerland -- 34.3.1 Adoption and Efficacy -- 34.4 Conclusion. , References.
    Additional Edition: ISBN 3-031-33385-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949763174402882
    Format: 1 online resource (249 pages)
    Edition: 1st ed. 2024.
    ISBN: 3-031-54827-2
    Content: This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the increased availability of powerful large language models (LLMs) and how they can be mitigated. It attempts to outrun the malicious attackers by anticipating what they could do. It also alerts LLM developers to understand their work's risks for cybersecurity and provides them with tools to mitigate those risks. The book starts in Part I with a general introduction to LLMs and their main application areas. Part II collects a description of the most salient threats LLMs represent in cybersecurity, be they as tools for cybercriminals or as novel attack surfaces if integrated into existing software. Part III focuses on attempting to forecast the exposure and the development of technologies and science underpinning LLMs, as well as macro levers available to regulators to further cybersecurity in the age of LLMs. Eventually, in Part IV, mitigation techniques that should allowsafe and secure development and deployment of LLMs are presented. The book concludes with two final chapters in Part V, one speculating what a secure design and integration of LLMs from first principles would look like and the other presenting a summary of the duality of LLMs in cyber-security. This book represents the second in a series published by the Technology Monitoring (TM) team of the Cyber-Defence Campus. The first book entitled "Trends in Data Protection and Encryption Technologies" appeared in 2023. This book series provides technology and trend anticipation for government, industry, and academic decision-makers as well as technical experts.
    Note: Part I: Introduction -- 1. From Deep Neural Language Models to LLMs -- 2. Adapting LLMs to Downstream Applications -- 3. Overview of Existing LLM Families -- 4. Conversational Agents -- 5. Fundamental Limitations of Generative LLMs -- 6. Tasks for LLMs and their Evaluation -- Part II: LLMs in Cybersecurity -- 7. Private Information Leakage in LLMs -- 8. Phishing and Social Engineering in the Age of LLMs -- 9. Vulnerabilities Introduced by LLMs through Code Suggestions -- 10. LLM Controls Execution Flow Hijacking -- 11. LLM-Aided Social Media Influence Operations -- 12. Deep(er)Web Indexing with LLMs -- Part III: Tracking and Forecasting Exposure -- 13. LLM Adoption Trends and Associated Risks -- 14. The Flow of Investments in the LLM Space -- 15. Insurance Outlook for LLM-Induced Risk -- 16. Copyright-Related Risks in the Creation and Use of ML/AI Systems -- 17. Monitoring Emerging Trends in LLM Research -- Part IV: Mitigation -- 18. Enhancing Security Awareness and Education for LLMs -- 19. Towards Privacy Preserving LLMs Training -- 20. Adversarial Evasion on LLMs -- 21. Robust and Private Federated Learning on LLMs -- 22. LLM Detectors -- 23. On-Site Deployment of LLMs -- 24. LLMs Red Teaming -- 25. Standards for LLM Security -- Part V: Conclusion -- 26. Exploring the Dual Role of LLMs in Cybersecurity: Threats and Defenses -- 27. Towards Safe LLMs Integration.
    Additional Edition: ISBN 3-031-54826-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_1869165977
    Format: 1 Online-Ressource (262 p.)
    ISBN: 9783031333866 , 9783031333859
    Content: This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption and data protection technologies and their global usage trends. The Swiss Confederation tasked the Cyber-Defence Campus (CYD Campus) to identify the 38 most relevant encryption and data protection technologies, analyze their expected evolution until 2025, and derive implications for the military, civil society, and economy sectors. Fifty experts from academia, government, and industry have contributed to this study and provided their viewpoints on the different technologies and trends. This comprehensive collection of factsheets provides a reference for organizations and individuals that need to elaborate coherent and efficient data protection and encryption strategies in the coming years. The 38 technologies have been sorted into five categories. First, encryption foundations represent the technologies used to create other encryption applications. Second, low-level applications represent the technologies that focus on micro functionalities. Third, high-level applications represent the technologies that focus on more abstract and macro functionalities. Fourth, data protection represents the technologies used to protect data without encrypting these data. Finally, use cases represent concrete ways the different technologies can be used together to create a working solution. The book serves as a guide for decision-making within administrations, government organizations, and industry. It will also be interesting for the tech-savvy board member or engineers looking to get an entry point into data protection topics. Last not least, the book will also be a valuable reading for anyone interested in data protection and encryption
    Note: English
    Language: Undetermined
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    kobvindex_HPB1393224341
    Format: 1 online resource (xix, 262 pages)
    ISBN: 9783031333866 , 3031333861
    Content: This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption and data protection technologies and their global usage trends. The Swiss Confederation tasked the Cyber-Defence Campus (CYD Campus) to identify the 38 most relevant encryption and data protection technologies, analyze their expected evolution until 2025, and derive implications for the military, civil society, and economy sectors. Fifty experts from academia, government, and industry have contributed to this study and provided their viewpoints on the different technologies and trends. This comprehensive collection of factsheets provides a reference for organizations and individuals that need to elaborate coherent and efficient data protection and encryption strategies in the coming years. The 38 technologies have been sorted into five categories. First, encryption foundations represent the technologies used to create other encryption applications. Second, low-level applications represent the technologies that focus on micro functionalities. Third, high-level applications represent the technologies that focus on more abstract and macro functionalities. Fourth, data protection represents the technologies used to protect data without encrypting these data. Finally, use cases represent concrete ways the different technologies can be used together to create a working solution. The book serves as a guide for decision-making within administrations, government organizations, and industry. It will also be interesting for the tech-savvy board member or engineers looking to get an entry point into data protection topics. Last not least, the book will also be a valuable reading for anyone interested in data protection and encryption.
    Note: Intro -- Foreword by Quentin Ladetto -- Foreword by Florian Schütz -- Preface -- Acknowledgements -- Contents -- List of Contributors -- Part I Encryption Foundations -- 1 One-Time Pad -- 1.1 Introduction -- 1.2 Analysis -- 1.2.1 Definition -- 1.2.2 Trends -- 1.3 Consequences for Switzerland -- 1.3.1 Implementation Possibilities -- 1.4 Conclusion -- References -- 2 Symmetric Cryptography -- 2.1 Introduction -- 2.2 Analysis -- 2.2.1 Definition -- 2.2.2 Trends -- 2.3 Consequences for Switzerland -- 2.3.1 Implementation Possibilities -- 2.4 Conclusion -- References -- 3 Asymmetric Encryption , 3.1 Introduction -- 3.2 Analysis -- 3.2.1 Definition -- 3.2.2 Trends -- 3.3 Consequences for Switzerland -- 3.3.1 Implementation Possibilities: Make or Buy -- 3.3.2 Variation and Recommendation -- 3.4 Conclusion -- References -- 4 Key Management -- 4.1 Introduction -- 4.2 Analysis -- 4.2.1 Definition -- 4.2.1.1 Key Creation -- 4.2.1.2 Key Storage -- 4.2.1.3 Key Distribution -- 4.2.1.4 Key Usage -- 4.2.2 Trends -- 4.3 Consequences for Switzerland -- 4.3.1 Implementation Possibilities: Make or Buy -- 4.3.2 Variations and Recommendation -- 4.4 Conclusion -- References -- 5 Hash Functions , 5.1 Introduction -- 5.2 Analysis -- 5.2.1 Definition -- 5.2.2 Trends -- 5.3 Consequences for Switzerland -- 5.3.1 Implementation Possibilities -- 5.4 Conclusion -- References -- 6 Zero-Knowledge Proof -- 6.1 Introduction -- 6.2 Analysis -- 6.2.1 Definition -- 6.2.2 Trends -- 6.3 Consequences for Switzerland -- 6.3.1 Public Sector -- 6.3.2 Private Sector -- 6.3.3 Civil Society -- 6.3.4 Implementation Possibilities: Make or Buy -- 6.3.5 Variation and Recommendation -- 6.4 Conclusion -- References -- 7 Random Number Generator -- 7.1 Introduction -- 7.2 Analysis -- 7.2.1 Definition -- 7.2.2 Trends , 7.3 Consequences for Switzerland -- 7.3.1 Implementation Possibilities: Make or Buy -- 7.3.2 Variation and Recommendation -- 7.4 Conclusion -- References -- 8 Homomorphic Encryption -- 8.1 Introduction -- 8.2 Definition and Analysis -- 8.2.1 Trends -- 8.3 Consequences for Switzerland -- 8.3.1 Implementation Possibilities: Make or Buy -- 8.3.2 Variations and Recommendation -- 8.4 Conclusion -- References -- 9 Quantum Key Distribution -- 9.1 Introduction -- 9.2 Analysis -- 9.2.1 Definition -- 9.2.2 Trends -- 9.3 Consequences for Switzerland -- 9.3.1 Implementation Possibilities: Make or Buy , 9.3.2 Variations and Recommendation -- 9.4 Conclusion -- References -- 10 Post-quantum Cryptography -- 10.1 Introduction -- 10.2 Analysis -- 10.2.1 Definition -- 10.2.2 Trends -- 10.3 Consequences for Switzerland -- 10.3.1 Implementation Possibilities: Make or Buy -- 10.3.2 Variations and Recommendation -- 10.4 Conclusion -- References -- Part II Low-Level Applications -- 11 Functional Encryption -- 11.1 Introduction -- 11.2 Analysis -- 11.2.1 Definition -- 11.2.2 Trends -- 11.3 Consequences for Switzerland -- 11.3.1 Implementation Possibilities: Make or Buy
    Additional Edition: ISBN 3031333853
    Additional Edition: ISBN 9783031333859
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    edoccha_9961213488502883
    Format: 1 online resource (253 pages)
    Edition: 1st ed. 2023.
    ISBN: 3-031-33386-1
    Content: This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption and data protection technologies and their global usage trends. The Swiss Confederation tasked the Cyber-Defence Campus (CYD Campus) to identify the 38 most relevant encryption and data protection technologies, analyze their expected evolution until 2025, and derive implications for the military, civil society, and economy sectors. Fifty experts from academia, government, and industry have contributed to this study and provided their viewpoints on the different technologies and trends. This comprehensive collection of factsheets provides a reference for organizations and individuals that need to elaborate coherent and efficient data protection and encryption strategies in the coming years. The 38 technologies have been sorted into five categories. First, encryption foundations represent the technologies used to create other encryption applications. Second, low-level applications represent the technologies that focus on micro functionalities. Third, high-level applications represent the technologies that focus on more abstract and macro functionalities. Fourth, data protection represents the technologies used to protect data without encrypting these data. Finally, use cases represent concrete ways the different technologies can be used together to create a working solution. The book serves as a guide for decision-making within administrations, government organizations, and industry. It will also be interesting for the tech-savvy board member or engineers looking to get an entry point into data protection topics. Last not least, the book will also be a valuable reading for anyone interested in data protection and encryption.
    Note: Intro -- Foreword by Quentin Ladetto -- Foreword by Florian Schütz -- Preface -- Acknowledgements -- Contents -- List of Contributors -- Part I Encryption Foundations -- 1 One-Time Pad -- 1.1 Introduction -- 1.2 Analysis -- 1.2.1 Definition -- 1.2.2 Trends -- 1.3 Consequences for Switzerland -- 1.3.1 Implementation Possibilities -- 1.4 Conclusion -- References -- 2 Symmetric Cryptography -- 2.1 Introduction -- 2.2 Analysis -- 2.2.1 Definition -- 2.2.2 Trends -- 2.3 Consequences for Switzerland -- 2.3.1 Implementation Possibilities -- 2.4 Conclusion -- References -- 3 Asymmetric Encryption -- 3.1 Introduction -- 3.2 Analysis -- 3.2.1 Definition -- 3.2.2 Trends -- 3.3 Consequences for Switzerland -- 3.3.1 Implementation Possibilities: Make or Buy -- 3.3.2 Variation and Recommendation -- 3.4 Conclusion -- References -- 4 Key Management -- 4.1 Introduction -- 4.2 Analysis -- 4.2.1 Definition -- 4.2.1.1 Key Creation -- 4.2.1.2 Key Storage -- 4.2.1.3 Key Distribution -- 4.2.1.4 Key Usage -- 4.2.2 Trends -- 4.3 Consequences for Switzerland -- 4.3.1 Implementation Possibilities: Make or Buy -- 4.3.2 Variations and Recommendation -- 4.4 Conclusion -- References -- 5 Hash Functions -- 5.1 Introduction -- 5.2 Analysis -- 5.2.1 Definition -- 5.2.2 Trends -- 5.3 Consequences for Switzerland -- 5.3.1 Implementation Possibilities -- 5.4 Conclusion -- References -- 6 Zero-Knowledge Proof -- 6.1 Introduction -- 6.2 Analysis -- 6.2.1 Definition -- 6.2.2 Trends -- 6.3 Consequences for Switzerland -- 6.3.1 Public Sector -- 6.3.2 Private Sector -- 6.3.3 Civil Society -- 6.3.4 Implementation Possibilities: Make or Buy -- 6.3.5 Variation and Recommendation -- 6.4 Conclusion -- References -- 7 Random Number Generator -- 7.1 Introduction -- 7.2 Analysis -- 7.2.1 Definition -- 7.2.2 Trends -- 7.3 Consequences for Switzerland. , 7.3.1 Implementation Possibilities: Make or Buy -- 7.3.2 Variation and Recommendation -- 7.4 Conclusion -- References -- 8 Homomorphic Encryption -- 8.1 Introduction -- 8.2 Definition and Analysis -- 8.2.1 Trends -- 8.3 Consequences for Switzerland -- 8.3.1 Implementation Possibilities: Make or Buy -- 8.3.2 Variations and Recommendation -- 8.4 Conclusion -- References -- 9 Quantum Key Distribution -- 9.1 Introduction -- 9.2 Analysis -- 9.2.1 Definition -- 9.2.2 Trends -- 9.3 Consequences for Switzerland -- 9.3.1 Implementation Possibilities: Make or Buy -- 9.3.2 Variations and Recommendation -- 9.4 Conclusion -- References -- 10 Post-quantum Cryptography -- 10.1 Introduction -- 10.2 Analysis -- 10.2.1 Definition -- 10.2.2 Trends -- 10.3 Consequences for Switzerland -- 10.3.1 Implementation Possibilities: Make or Buy -- 10.3.2 Variations and Recommendation -- 10.4 Conclusion -- References -- Part II Low-Level Applications -- 11 Functional Encryption -- 11.1 Introduction -- 11.2 Analysis -- 11.2.1 Definition -- 11.2.2 Trends -- 11.3 Consequences for Switzerland -- 11.3.1 Implementation Possibilities: Make or Buy -- 11.3.2 Variations and Recommendation -- 11.4 Conclusion -- References -- 12 Identity-Based Cryptography -- 12.1 Introduction -- 12.2 Analysis -- 12.2.1 Definition -- 12.2.2 Trends -- 12.3 Consequences for Switzerland -- 12.3.1 Implementation Possibilities: Make or Buy -- 12.3.2 Variations and Recommendation -- 12.4 Conclusion -- References -- 13 Multi-Party Threshold Cryptography -- 13.1 Introduction -- 13.2 Analysis -- 13.2.1 Definition -- 13.2.2 Trends -- 13.3 Consequences for Switzerland -- 13.3.1 Implementation Possibilities: Make or Buy -- 13.3.2 Variations and Recommendation -- 13.4 Conclusion -- References -- 14 Searchable Symmetric Encryption -- 14.1 Introduction -- 14.2 Analysis -- 14.2.1 Definition -- 14.2.2 Trends. , 14.3 Consequences for Switzerland -- 14.3.1 Implementation Possibilities: Make or Buy -- 14.3.2 Variations and Recommendation -- 14.4 Conclusion -- References -- 15 Digital Signature -- 15.1 Introduction -- 15.2 Analysis -- 15.2.1 Definition -- 15.2.2 Trends -- 15.3 Consequences for Switzerland -- 15.3.1 Implementation Possibilities: Make or Buy -- 15.3.1.1 Distinction from Electronic Signature -- 15.3.1.2 Code Signing -- 15.4 Conclusion -- References -- 16 Hardware Security Module -- 16.1 Introduction -- 16.2 Analysis -- 16.2.1 Definition -- 16.2.2 Trends -- 16.3 Consequences for Switzerland -- 16.3.1 Maturity -- 16.3.2 Recommendation and Options -- 16.4 Conclusion -- References -- 17 Secure Multi-Party Computation -- 17.1 Introduction -- 17.2 Analysis -- 17.2.1 Definition -- 17.2.2 Trends -- 17.3 Consequences for Switzerland -- 17.3.1 Implementation Possibilities: Make or Buy -- 17.3.2 Variations and Recommendation -- 17.4 Conclusion -- References -- Part III High-Level Applications -- 18 Trusted Execution Environment -- 18.1 Introduction -- 18.2 Analysis -- 18.2.1 Definition -- 18.2.2 Trends -- 18.2.2.1 Application on Mobile Phones -- 18.2.2.2 Security in Cloud Data Processing -- 18.2.2.3 Data Protection Laws -- 18.2.2.4 Cryptocurrency Usage -- 18.2.2.5 Demand -- 18.2.2.6 Actors -- 18.2.2.7 Research -- 18.3 Consequences for Switzerland -- 18.3.1 Maturity -- 18.3.1.1 Recommendations and Options -- 18.4 Conclusion -- References -- 19 Confidential Computing -- 19.1 Introduction -- 19.2 Analysis -- 19.2.1 Definition -- 19.2.2 Trends -- 19.3 Consequences for Switzerland -- 19.3.1 Implementation Possibilities: Make or Buy -- 19.4 Conclusion -- References -- 20 Hardware Acceleration -- 20.1 Introduction -- 20.2 Analysis -- 20.2.1 Definition -- 20.2.2 Trends -- 20.3 Consequences for Switzerland -- 20.3.1 Implementation Possibilities: Make or Buy. , 20.3.2 Variations and Recommendation -- 20.4 Conclusion -- References -- 21 Secure Operating System -- 21.1 Introduction -- 21.2 Analysis -- 21.2.1 Definition -- 21.2.2 Trends -- 21.3 Consequences for Switzerland -- 21.3.1 Implementation Possibilities: Make or Buy -- 21.4 Conclusion -- References -- 22 Biometrics -- 22.1 Introduction -- 22.2 Analysis -- 22.2.1 Definition -- 22.2.2 Trends -- 22.3 Consequences for Switzerland -- 22.3.1 Implementation Possibilities: Make or Buy -- 22.3.2 Variation and Recommendation -- 22.4 Conclusion -- References -- 23 Electronic Voting -- 23.1 Introduction -- 23.2 Analysis -- 23.2.1 Definition -- 23.2.2 Trends -- 23.3 Consequences for Switzerland -- 23.3.1 Implementation Possibilities: Make or Buy -- 23.3.2 Variations and Recommendation -- 23.4 Conclusion -- References -- 24 Data in Transit Security -- 24.1 Introduction -- 24.2 Analysis -- 24.2.1 Definition -- 24.2.2 Trends -- 24.3 Consequences for Switzerland -- 24.3.1 Implementation Possibilities: Make or Buy -- 24.4 Conclusion -- References -- 25 Blockchain -- 25.1 Introduction -- 25.2 Analysis -- 25.2.1 Definition -- 25.2.2 Trends -- 25.3 Consequences for Switzerland -- 25.3.1 Implementation Possibilities: Make or Buy -- 25.3.2 Use Cases -- 25.4 Conclusion -- References -- 26 Tunneling and VPN -- 26.1 Introduction -- 26.2 Analysis -- 26.2.1 Definition -- 26.2.2 Trends -- 26.3 Consequences for Switzerland -- 26.3.1 Implementation Possibilities: Make or Buy -- 26.3.2 Variation and Recommendation -- 26.4 Conclusion -- References -- Part IV Data Protection -- 27 Differential Privacy -- 27.1 Introduction -- 27.2 Analysis -- 27.2.1 Definition -- 27.2.2 Trends -- 27.3 Consequences for Switzerland -- 27.3.1 Implementation Possibilities: Make or Buy -- 27.4 Conclusion -- References -- 28 Digital Rights Management -- 28.1 Introduction -- 28.2 Analysis -- 28.2.1 Definition. , 28.2.2 Trends -- 28.3 Consequences for Switzerland -- 28.3.1 Implementation Possibilities: Make or Buy -- 28.3.2 Variation and Recommendation -- 28.4 Conclusion -- References -- 29 Authentication -- 29.1 Introduction -- 29.2 Analysis -- 29.2.1 Definition -- 29.2.2 Trends -- 29.3 Consequences for Switzerland -- 29.3.1 Implementation Possibilities: Make or Buy -- 29.4 Conclusion -- References -- Part V Use-Cases -- 30 Secure Media -- 30.1 Introduction -- 30.2 Analysis -- 30.2.1 Definition -- 30.2.2 Trends -- 30.3 Consequences for Switzerland -- 30.3.1 Implementation Possibilities: Make or Buy -- 30.3.2 Variations and Recommendation -- 30.4 Conclusion -- References -- 31 Secure Positioning and Localization -- 31.1 Introduction -- 31.2 Analysis -- 31.2.1 Definition -- 31.2.2 Trends -- 31.3 Consequences for Switzerland -- 31.3.1 Implementation Possibilities: Make or Buy -- 31.3.2 Variations and Recommendation -- 31.4 Conclusion -- References -- 32 Secure Payment -- 32.1 Introduction -- 32.2 Analysis -- 32.2.1 Definition -- 32.2.2 Trends -- 32.3 Consequences for Switzerland -- 32.3.1 Implementation Possibilities: Make or Buy -- 32.3.2 Variation and Recommendation -- 32.4 Conclusion -- References -- 33 Disk, File and Database Encryption -- 33.1 Introduction -- 33.2 Analysis -- 33.3 Definition -- 33.3.1 Full Disk Encryption (FDE) -- 33.3.2 File-Based Encryption (FBE) -- 33.3.3 Manual File Encryption -- 33.3.4 Database Encryption (DBE) -- 33.4 Security Considerations -- 33.4.1 Encryption Algorithms -- 33.4.2 Key Management -- 33.4.3 Coercion -- 33.5 OS Examples -- 33.6 Trends -- 33.7 Consequences for Switzerland -- 33.8 Conclusion -- References -- 34 WEB3 -- 34.1 Introduction -- 34.2 Analysis -- 34.2.1 Definition -- 34.2.2 Technologies -- 34.2.3 Risks -- 34.2.4 Trends -- 34.3 Consequences for Switzerland -- 34.3.1 Adoption and Efficacy -- 34.4 Conclusion. , References.
    Additional Edition: ISBN 3-031-33385-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages