SFr. 37.50
€ 40.50
BTC 0.0007
LTC 0.552
ETH 0.0135


bestellen

Artikel-Nr. 39400151


Diesen Artikel in meine
Wunschliste
Diesen Artikel
weiterempfehlen
Diesen Preis
beobachten

Weitersagen:



Autor(en): 
  • Silver
  • Building Tamper-Resilient Memory: A Theoretical Approach 
     

    (Buch)
    Dieser Artikel gilt, aufgrund seiner Grösse, beim Versand als 2 Artikel!


    Übersicht

    Auf mobile öffnen
     
    Lieferstatus:   i.d.R. innert 7-14 Tagen versandfertig
    Veröffentlichung:  Oktober 2023  
    Genre:  Psychologie / Pädagogik 
    ISBN:  9788196663933 
    EAN-Code: 
    9788196663933 
    Verlag:  Self Publishers 
    Einband:  Kartoniert  
    Sprache:  English  
    Dimensionen:  H 229 mm / B 152 mm / D 11 mm 
    Gewicht:  282 gr 
    Seiten:  188 
    Zus. Info:  Paperback 
    Bewertung: Titel bewerten / Meinung schreiben
    Inhalt:
    Tamper-proof memory (TPM) is a type of memory that is designed to resist unauthorized access, modification, or destruction. TPM is often used in high-security applications, such as government and financial systems, to protect sensitive data from unauthorized access. There are a number of different ways to build tamper-proof memory. One common approach is to use physical security measures, such as tamper-evident seals or encryption, to protect the memory from unauthorized access. Another approach is to use cryptographic techniques to make the memory tamper-proof. One promising theoretical approach to building tamper-proof memory is to use a technique called homomorphic encryption. Homomorphic encryption is a type of encryption that allows computations to be performed on encrypted data without decrypting it first. This makes homomorphic encryption ideal for protecting sensitive data from unauthorized access, even if the attacker has access to the encrypted data. To build tamper-proof memory using homomorphic encryption, we would first encrypt the data that we want to protect. We would then store the encrypted data in the memory. When we need to access the data, we would use the homomorphic encryption algorithm to perform the necessary computations on the encrypted data without decrypting it first. This would allow us to access the data without revealing it to the attacker

      



    Wird aktuell angeschaut...
     

    Zurück zur letzten Ansicht


    AGB | Datenschutzerklärung | Mein Konto | Impressum | Partnerprogramm
    Newsletter | 1Advd.ch RSS News-Feed Newsfeed | 1Advd.ch Facebook-Page Facebook | 1Advd.ch Twitter-Page Twitter
    Forbidden Planet AG © 1999-2024
    Alle Angaben ohne Gewähr
     
    SUCHEN

     
     Kategorien
    Im Sortiment stöbern
    Genres
    Hörbücher
    Aktionen
     Infos
    Mein Konto
    Warenkorb
    Meine Wunschliste
     Kundenservice
    Recherchedienst
    Fragen / AGB / Kontakt
    Partnerprogramm
    Impressum
    © by Forbidden Planet AG 1999-2024