Search results: Found 5

Listing 1 - 5 of 5
Sort by
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems

Author:
ISBN: 9783731503286 Year: Pages: XIII, 191 p. DOI: 10.5445/KSP/1000045068 Language: ENGLISH
Publisher: KIT Scientific Publishing
Subject: Computer Science
Added to DOAB on : 2019-07-30 20:02:02
License:

Loading...
Export citation

Choose an application

Abstract

This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing the external storage provider to process incoming queries. For public DHTs, it is shown how these highly dynamic systems can be managed by facilitating monitoring, simulation, and self-adaptation.

Tunable Security for Deployable Data Outsourcing

Author:
ISBN: 9783731504115 Year: Pages: XIII, 257 p. DOI: 10.5445/KSP/1000048084 Language: ENGLISH
Publisher: KIT Scientific Publishing
Subject: Computer Science
Added to DOAB on : 2019-07-30 20:02:00

Loading...
Export citation

Choose an application

Abstract

Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design phase. This book introduces a methodology that can be used to build such tunable approaches. The book shows how the proposed methodology can be applied in the domains of database outsourcing, identity management, and credential management.

Bestimmungsfaktoren der Vertragsforschung in Deutschland

Author:
Book Series: cege-Schriften ISBN: 9783631567142 Year: Pages: 270 Language: German
Publisher: Peter Lang International Academic Publishing Group
Subject: Business and Management --- Economics
Added to DOAB on : 2019-01-15 13:32:14
License:

Loading...
Export citation

Choose an application

Abstract

Die offiziellen Daten zur FuE-Tätigkeit der deutschen Wirtschaft zeigen eine zunehmende Bedeutung der Vertragsforschung als einer Organisationsalternative für die Abwicklung von FuE-Aktivitäten. Der Anteil der für den externen Bezug von FuE-Dienstleistungen aufgewendeten Mittel im Verhältnis zu den gesamten FuE-Aufwendungen der Unternehmen ist zwischen 1979 und 2003 von etwa 5% auf über 18% angestiegen. Die Gründe für die verstärkte Fremdvergabe von FuE-Aufträgen an unternehmensexterne Partner sind jedoch bisher nur unzureichend untersucht worden. In dieser Studie werden die Determinanten der Vertragsforschungsaktivitäten theoretisch untersucht und auf der Grundlage des Mannheimer Innovationspanels auf Unternehmensebene geschätzt.

Agency Theory: Methodology, Analysis

Author:
Book Series: Forschungsergebnisse der Wirtschaftsuniversitaet Wien ISBN: 9783631529737 Year: Pages: 241 Language: English
Publisher: Peter Lang International Academic Publishing Group
Subject: Economics
Added to DOAB on : 2019-01-15 13:32:25
License:

Loading...
Export citation

Choose an application

Abstract

Designing a contract is often more of an economic than a legal problem. A good contract protects parties against opportunistic behavior while providing motivation to cooperate. This is where economics and, especially contract theory, may prove helpful by enhancing our understanding of incentive issues. The purpose of this book is to provide specific tools which will help to write better contracts in real world environments. Concentrating on moral hazard literature, this book derives a tentative checklist for drafting contracts. As an economic contribution to a field traditionally considered an art rather than a science, this treatment also gives much attention to methodological issues.

Side Channel Attacks

Author:
ISBN: 9783039210008 / 9783039210015 Year: Pages: 258 DOI: 10.3390/books978-3-03921-001-5 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-06-26 08:44:06
License:

Loading...
Export citation

Choose an application

Abstract

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Keywords

cache attack --- cache side-channel attack --- constant-time cryptographic algorithm --- rsa cryptosystem --- scatter-gather implementation --- modular exponentiation --- post-quantum cryptography --- lattice-based cryptography --- Gaussian sampling --- CDT sampling --- side-channel attack --- single trace analysis --- mobile ads --- software development kit (SDK), android package (APK), ad lib --- ad libraries --- ad networks --- graph --- graph similarity --- side-channel authentication --- leakage model --- AES --- FPGA --- unified point addition --- binary Huff curve --- recovery of secret exponent by triangular trace analysis --- horizontal collision correlation analysis --- side channel analysis --- single trace analysis --- post quantum cryptography --- NTRU --- side-channel analysis --- elliptic curve cryptography --- single-trace attack --- key bit-dependent attack --- countermeasure --- side channel analysis --- financial IC card --- first-order analysis --- second-order analysis --- data outsourcing --- integrity --- online authentication --- Merkle (hash) tree --- data loss --- information leakage --- reliability --- side-channel analysis --- power-analysis attack --- embedded system security --- machine-learning classification --- side-channel cache attacks --- cache misses --- AES --- cloud computing --- physically unclonable function --- chaos theory --- chaotic circuit --- FPGA --- CPLD --- challenge-response authentication --- hardware security --- side-channel attacks --- cryptographic keys --- side channel attack --- re-keying --- tweakable block cipher --- provable security --- n/a

Listing 1 - 5 of 5
Sort by