feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham : Springer International Publishing
    UID:
    b3kat_BV044530992
    Format: 1 Online-Ressource (XVI, 228 p. 27 illus)
    ISBN: 9783319659398
    Series Statement: Studies in Systems, Decision and Control 122
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-65938-1
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV044979999
    Format: 1 Online-Ressource (XVIII, 184 p. 151 illus., 94 illus. in color)
    ISBN: 9783319744827
    Series Statement: University of Tehran Science and Humanities Series
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-74481-0
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV045270284
    Format: 1 Online-Ressource (xiv, 112 Seiten) , Illustrationen, Diagramme
    ISBN: 9783319914497
    Series Statement: Studies in systems, decision and control 156
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-91448-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-91450-3
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_1654893811
    Format: Online-Ressource
    Edition: Middle East and Islamic studies e-books online
    ISBN: 9789004252011
    Series Statement: Islamic history and civilization 114
    Content: Preliminary Material -- 1 Variant Traditions, Relative Chronology, and the Study of Intra-Quranic Parallels /Joseph Witztum -- 2 The Earliest Attestation of the Dhimma of God and His Messenger and the Rediscovery of P. Nessana 77 (60s ah/680 ce) /Robert Hoyland and Hannah Cotton -- 3 Jewish Christianity and Islamic Origins /Guy G. Stroumsa -- 4 A Note on the Relationship between Tafsīr and Common Understanding with Reference to Contracts of Marriage /Karen Bauer -- 5 “Earnest Money” and the Sources of Islamic Law /Gerald Hawting and David M. Eisenberg -- 6 “A Bequest May Not Exceed One-Third”: An Isnād-cum-Matn Analysis and Beyond /Pavel Pavlovitch and David S. Powers -- 7 Basra and Kufa as the Earliest Centers of Islamic Legal Controversy /Christopher Melchert -- 8 God’s Cleric: Al-Fuḍayl born ʿIyāḍ and the Transition from Caliphal to Prophetic Sunna /Deborah G. Tor -- 9 Aḥmad ibn Ṭūlūn and the Politics of Deference /Matthew S. Gordon -- 10 Eighth-Century Indian Astronomy in the Two Cities of Peace /Kevin van Bladel -- 11 Greek Language and Education under Early Islam /Maria Mavroudi -- 12 Kalām and the Greeks /Fritz W. Zimmermann -- 13 “Arabs” and “Iranians”: The Uses of Ethnicity in the Early Abbasid Period /Michael Cooperson -- 14 The Poetics of Cultural Identity: Al-Mutanabbī among the Būyids /Margaret Larkin -- 15 Must God Tell Us the Truth? A Problem in Ashʿarī Theology /Khaled El-Rouayheb -- 16 Administrators’ Time: The Social Memory of the Early Medieval State, East and West /Chris Wickham -- 17 An Eleventh-Century Justification of the Authority of Twelver Shiite Jurists /Devin J. Stewart -- 18 A Family Story: Ambiguities of Jewish Identity in Medieval Islam /David J. Wasserstein -- 19 What Happened in al-Andalus: Minorities in al-Andalus and in Christian Spain /David Abulafia -- 20 The Samaritan Version of the Esther Story /Adam Silverstein -- 21 New Evidence for the Survival of Sexually Libertine Rites among some Nuṣayrī-ʿAlawīs of the Nineteenth Century /Bella Tendler Krieger -- 22 Crone and the End of Orientalism /Chase F. Robinson -- Index.
    Content: This volume brings together articles on various aspects of the intellectual and social histories of Islamicate societies and of the traditions and contexts that contributed to their formation and evolution. Written by leading scholars who span three generations and who cover such diverse fields as Late Antique Studies, Islamic Studies, Classics, and Jewish Studies, the volume is a testament to the breadth and to the sustained, deep impact of the corpus of the honoree, Professor Patricia Crone. Contributors are: David Abulafia, Asad Q. Ahmed, Karen Bauer, Michael Cooperson, Hannah Cotton, David M. Eisenberg, Khaled El-Rouayheb, Matthew S. Gordon, Gerald Hawting, Judith Herrin, Robert Hoyland, Bella Tendler Krieger, Margaret Larkin, Maria Mavroudi, Christopher Melchert, Pavel Pavlovitch, David Powers, Chase Robinson, Behnam Sadeghi, Adam Silverstein, Devin Stewart, Guy Stroumsa, D. G. Tor, Kevin van Bladel, David J. Wasserstein, Chris Wickam, Joseph Witztum, F. W. Zimmermann
    Note: Includes bibliographical references and index , Contents; Preface; Patricia Crone: A Brief Memoir; Tabula Gratulatoria; Curriculum Vitae of Patricia Crone; List of Contributors; Chapter 1 Variant Traditions, Relative Chronology, and the Study of Intra-Quranic Parallels; Chapter 2 The Earliest Attestation of the Dhimma of God and His Messenger and the Rediscovery of P. Nessana 77 (60s AH/680 CE); Chapter 3 Jewish Christianity and Islamic Origins; Chapter 4 A Note on the Relationship between Tafsīr and Common Understanding with Reference to Contracts of Marriage; Chapter 5 "Earnest Money" and the Sources of Islamic Law , Chapter 6 "A Bequest May Not Exceed One-Third": An Isnād-cum-Matn Analysis and BeyondChapter 7 Basra and Kufa as the Earliest Centers of Islamic Legal Controversy; Chapter 8 God's Cleric: Al-Fuḍayl b. ʿIyāḍ and the Transition from Caliphal to Prophetic Sunna; Chapter 9 Ahmad ibn Tūlūn and the Politics of Deference; Chapter 10 Eighth-Century Indian Astronomy in the Two Cities of Peace; Chapter 11 Greek Language and Education under Early Islam; Chapter 12 Kalām and the Greeks; Chapter 13 "Arabs" and "Iranians": The Uses of Ethnicity in the Early Abbasid Period , Chapter 14 The Poetics of Cultural Identity: Al-Mutanabbī among the BūyidsChapter 15 Must God Tell Us the Truth? A Problem in Ash'arī Theology; Chapter 16 Administrators' Time: The Social Memory of the Early Medieval State, East and West; Chapter 17 An Eleventh-Century Justification of the Authority of Twelver Shiite Jurists; Chapter 18 A Family Story: Ambiguities of Jewish Identity in Medieval Islam; Chapter 19 What Happened in al-Andalus: Minorities in al-Andalus and in Christian Spain; Chapter 20 The Samaritan Version of the Esther Story , Chapter 21 New Evidence for the Survival of Sexually Libertine Rites among some Nusayrī-'Alawīs of the Nineteenth CenturyChapter 22 Crone and the End of Orientalism; Index
    Additional Edition: ISBN 9789004281714
    Additional Edition: ISBN 9789004252011
    Additional Edition: Erscheint auch als Druck-Ausgabe Islamic cultures, Islamic contexts Leiden [u.a.] : Brill, 2015 ISBN 9789004252011
    Language: English
    Keywords: Geistesleben ; Kultur ; Islamisches Recht ; Zivilisation ; Islam ; Festschrift ; Aufsatzsammlung
    URL: DOI
    Author information: Crone, Patricia 1945-2015
    Author information: Silverstein, Adam
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV042274217
    Format: 1 Online-Ressource (XXXVII, 631 Seiten) , Illustrationen
    ISBN: 9789004281714
    Series Statement: Islamic history and civilization volume 114
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-90-04-25201-1
    Language: English
    Subjects: History , Comparative Studies. Non-European Languages/Literatures
    RVK:
    RVK:
    Keywords: Orient ; Islam ; Kultur ; Geschichte ; Islamisches Recht ; Geistesleben ; Kultur ; Aufsatzsammlung ; Festschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Crone, Patricia 1945-2015
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    b3kat_BV043309527
    Format: 1 Online-Ressource (X, 74 Seiten) , 16 illus., 8 illus. in color
    ISBN: 9783319255460
    Series Statement: SpringerBriefs in Computer Science
    Additional Edition: Erscheint auch als Druckausgabe ISBN 978-3-319-25544-6
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Cyberattacke
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Sadeghi, Ahmad-Reza
    Author information: Davi, Lucas Vincenzo 1984-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_855532440
    Format: 1 Online-Ressource (xi, 76 Seiten)
    Edition: Also available in print
    ISBN: 1627057552 , 9781627057554
    Series Statement: Synthesis lectures on information security, privacy, & trust #14
    Content: Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system. This book provides an introduction to and overview of automatic software diversity techniques that, in one way or another, use randomization to greatly increase the difficulty of exploiting the vast amounts of low-level code in existence. Diversity-based defenses are motivated by the observation that a single attack will fail against multiple targets with unique attack surfaces. We introduce the many, often complementary, ways that one can diversify attack surfaces and provide an accessible guide to more than two decades worth of research on the topic. We also discuss techniques used in conjunction with diversity to prevent accidental disclosure of randomized program aspects and present an in-depth case study of one of our own diversification solutions
    Content: 1. Introduction -- 1.1 A brief history of program randomization -- 1.2 Book overview --
    Content: 2. Attacking and defending -- 2.1 Taxonomy of attacks -- 2.1.1 Memory corruption attacks -- 2.1.2 Information leaks -- 2.1.3 Code injection -- 2.1.4 Code reuse -- 2.1.5 JIT attacks -- 2.1.6 Program tampering -- 2.1.7 Reverse engineering -- 2.2 Taxonomy of defenses -- 2.2.1 Enforcement-based defenses -- 2.2.2 Program integrity monitors -- 2.2.3 Diversity-based defenses -- 2.2.4 Program obfuscation --
    Content: 3. What to diversify -- 3.1 Instruction level -- 3.2 Basic block level -- 3.3 Loop level -- 3.4 Function level -- 3.5 Program level -- 3.6 System level --
    Content: 4. When to diversify -- 4.1 The software life cycle -- 4.2 Quantifying the impact of diversity -- 4.2.1 Security impact -- 4.2.2 Performance impact --
    Content: 5. Case study: compile-time diversification -- 5.1 System description -- 5.1.1 Inserting NOP instructions -- 5.1.2 Equivalent instruction substitution -- 5.1.3 Instruction scheduling -- 5.2 Scalability of compile-time diversification -- 5.2.1 Cloud-based compilation -- 5.2.2 Scalability is practical -- 5.3 Evaluating diversification -- 5.3.1 Assessing diversification efficiency -- 5.3.2 Implementing survivor -- 5.4 Evaluating security -- 5.4.1 Frequently surviving gadgets -- 5.4.2 Determining optimal compiler parameters --
    Content: 6. Information leakage resilience --
    Content: 7. Advanced topics -- 7.1 Hybrid approaches -- 7.2 Error reports and patches -- Bibliography -- Authors' biographies
    Note: Includes bibliographical references (pages 61-73) , Also available in print. , Mode of access: World Wide Web. , System requirements: Adobe Acrobat Reader.
    Additional Edition: ISBN 9781627057349
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781627057349
    Language: English
    Author information: Sadeghi, Ahmad-Reza
    Author information: Davi, Lucas Vincenzo 1984-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_829868003
    Format: 1 Online-Ressource (ix, 81 Seiten) , Illustrationen
    Edition: Also available in print
    ISBN: 162705510X , 9781627055109
    Series Statement: Synthesis lectures on information security, privacy, & trust #12
    Content: Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software can never ensure their own integrity and trustworthiness while resource-constraints and economic factors often prevent the integration of sophisticated security hardware and cryptographic co-processors. In this context, Physically Unclonable Functions (PUFs) are an emerging and promising technology to establish trust in embedded systems with minimal hardware requirements. This book explores the design of trusted embedded systems based on PUFs. Specifically, it focuses on the integration of PUFs into secure and efficient cryptographic protocols that are suitable for a variety of embedded systems. It exemplarily discusses how PUFs can be integrated into lightweight device authentication and attestation schemes, which are popular and highly relevant applications of PUFs in practice. For the integration of PUFs into secure cryptographic systems, it is essential to have a clear view of their properties. This book gives an overview of different approaches to evaluate the properties of PUF implementations and presents the results of a large scale security analysis of different PUF types implemented in application-specific integrated circuits (ASICs). To analyze the security of PUF-based schemes as is common in modern cryptography, it is necessary to have a security framework for PUFs and PUF-based systems. In this book, we give a flavor of the formal modeling of PUFs that is in its beginning and that is still undergoing further refinement in current research. The objective of this book is to provide a comprehensive overview of the current state of secure PUF-based cryptographic system design and the related challenges and limitations
    Content: 1. Introduction --
    Content: 2. Basics of physically unclonable functions -- 2.1 PUF concept, properties, and assumptions -- 2.2 PUF types -- 2.2.1 Delay-based PUFs -- 2.2.2 Memory-based PUFs -- 2.2.3 Coating PUFs -- 2.2.4 Non-electric PUFs -- 2.3 Noise compensation and privacy amplification --
    Content: 3. Attacks on PUFs and PUF-based systems -- 3.1 Emulation attacks -- 3.2 Side channel attacks -- 3.3 Fault injection attacks -- 3.4 Invasive attacks --
    Content: 4. Advanced PUF concepts -- 4.1 Controlled PUFs -- 4.2 Publicly verifiable and emulatable PUFs -- 4.3 Reconfigurable PUFs --
    Content: 5. PUF implementations and evaluation -- 5.1 PUF implementations in ASIC -- 5.2 Evaluation methodology -- 5.2.1 Robustness analysis -- 5.2.2 Unpredictability analysis -- 5.3 Evaluation results -- 5.3.1 Robustness results -- 5.3.2 Unpredictability results -- 5.3.3. Discussion -- 5.4 Summary --
    Content: 6. PUF-based cryptographic protocols -- 6.1 Lightweight authentication based on PUFs -- 6.1.1 Literature overview of PUF-based device authentication -- 6.1.2 Protocol description and specification -- 6.1.3 Security analysis -- 6.2 PUF-based attestation -- 6.2.1 Protocol description and specification -- 6.2.2 Security analysis --
    Content: 7. Security model for PUF-based systems -- 7.1 Literature overview of PUF security models -- 7.2 Framework for physical functions -- 7.2.1 Background and rationale -- 7.2.2 Formalization -- 7.3 Robustness -- 7.3.1 Rationale -- 7.3.2 Formalization -- 7.4 Physical unclonability -- 7.4.1 Rationale -- 7.4.2 Formalization -- 7.5 Unpredictability -- 7.5.1 Rationale -- 7.5.2 Formalization -- 7.6 Conclusion --
    Content: 8. Conclusion -- Terms and abbreviations -- Bibliography -- Authors' biographies
    Note: Includes bibliographical references (pages 65-79) , 1. Introduction , 2. Basics of physically unclonable functions2.1 PUF concept, properties, and assumptions -- 2.2 PUF types -- 2.2.1 Delay-based PUFs -- 2.2.2 Memory-based PUFs -- 2.2.3 Coating PUFs -- 2.2.4 Non-electric PUFs -- 2.3 Noise compensation and privacy amplification , 3. Attacks on PUFs and PUF-based systems3.1 Emulation attacks -- 3.2 Side channel attacks -- 3.3 Fault injection attacks -- 3.4 Invasive attacks , 4. Advanced PUF concepts4.1 Controlled PUFs -- 4.2 Publicly verifiable and emulatable PUFs -- 4.3 Reconfigurable PUFs , 5. PUF implementations and evaluation5.1 PUF implementations in ASIC -- 5.2 Evaluation methodology -- 5.2.1 Robustness analysis -- 5.2.2 Unpredictability analysis -- 5.3 Evaluation results -- 5.3.1 Robustness results -- 5.3.2 Unpredictability results -- 5.3.3. Discussion -- 5.4 Summary , 6. PUF-based cryptographic protocols6.1 Lightweight authentication based on PUFs -- 6.1.1 Literature overview of PUF-based device authentication -- 6.1.2 Protocol description and specification -- 6.1.3 Security analysis -- 6.2 PUF-based attestation -- 6.2.1 Protocol description and specification -- 6.2.2 Security analysis , 7. Security model for PUF-based systems7.1 Literature overview of PUF security models -- 7.2 Framework for physical functions -- 7.2.1 Background and rationale -- 7.2.2 Formalization -- 7.3 Robustness -- 7.3.1 Rationale -- 7.3.2 Formalization -- 7.4 Physical unclonability -- 7.4.1 Rationale -- 7.4.2 Formalization -- 7.5 Unpredictability -- 7.5.1 Rationale -- 7.5.2 Formalization -- 7.6 Conclusion , 8. ConclusionTerms and abbreviations -- Bibliography -- Authors' biographies. , Also available in print. , System requirements: Adobe Acrobat Reader. , Mode of access: World Wide Web.
    Additional Edition: ISBN 1627055096
    Additional Edition: ISBN 9781627055093
    Language: English
    Keywords: Electronic books
    Author information: Sadeghi, Ahmad-Reza
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    San Rafael, California 〈1537 Fourth Street, San Rafael, CA 94901 USA〉 : Morgan & Claypool
    UID:
    gbv_1656539055
    Format: Online Ressource (1 PDF (ix, 81 pages)) , illustrations.
    Edition: Online-Ausg.
    ISBN: 9781627055109
    Series Statement: Synthesis lectures on information security, privacy, & trust 1945-9750 # 12
    Content: Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software can never ensure their own integrity and trustworthiness while resource-constraints and economic factors often prevent the integration of sophisticated security hardware and cryptographic co-processors. In this context, Physically Unclonable Functions (PUFs) are an emerging and promising technology to establish trust in embedded systems with minimal hardware requirements. This book explores the design of trusted embedded systems based on PUFs. Specifically, it focuses on the integration of PUFs into secure and efficient cryptographic protocols that are suitable for a variety of embedded systems. It exemplarily discusses how PUFs can be integrated into lightweight device authentication and attestation schemes, which are popular and highly relevant applications of PUFs in practice. For the integration of PUFs into secure cryptographic systems, it is essential to have a clear view of their properties. This book gives an overview of different approaches to evaluate the properties of PUF implementations and presents the results of a large scale security analysis of different PUF types implemented in application-specific integrated circuits (ASICs). To analyze the security of PUF-based schemes as is common in modern cryptography, it is necessary to have a security framework for PUFs and PUF-based systems. In this book, we give a flavor of the formal modeling of PUFs that is in its beginning and that is still undergoing further refinement in current research. The objective of this book is to provide a comprehensive overview of the current state of secure PUF-based cryptographic system design and the related challenges and limitations
    Note: Part of: Synthesis digital library of engineering and computer science. - Includes bibliographical references (pages 65-79). - Compendex. INSPEC. Google scholar. Google book search. - Title from PDF title page (viewed on January 17, 2015) , 1. Introduction -- , System requirements: Adobe Acrobat Reader.
    Additional Edition: ISBN 9781627055093
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-62705-509-3
    Language: English
    Author information: Sadeghi, Ahmad-Reza
    Author information: Wachsmann, Christian 1981-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_1657707385
    Format: Online-Ressource (XIV, 668 p. 110 illus, online resource)
    ISBN: 9783319395555
    Series Statement: Lecture Notes in Computer Science 9696
    Content: This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy
    Content: Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use
    Additional Edition: ISBN 9783319395548
    Additional Edition: Druckausg. ISBN 978-3-319-39554-8
    Additional Edition: Printed edition ISBN 9783319395548
    Language: English
    Keywords: Kryptologie ; Kryptosystem ; Rechnernetz ; Datensicherung ; Computersicherheit
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Sadeghi, Ahmad-Reza
    Author information: Manulis, Mark
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages