top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Domain Specific High-Level Synthesis for Cryptographic Workloads / / by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
Domain Specific High-Level Synthesis for Cryptographic Workloads / / by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
Autore Khalid Ayesha
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (254 pages)
Disciplina 652.8
Collana Computer Architecture and Design Methodologies
Soggetto topico Electronic circuits
Data encryption (Computer science)
System safety
Circuits and Systems
Cryptology
Security Science and Technology
ISBN 981-10-1070-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
Record Nr. UNINA-9910337635503321
Khalid Ayesha  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Operating systems : internals and design principles / / William Stallings
Operating systems : internals and design principles / / William Stallings
Autore Stallings William
Edizione [Seventh edition, International edition /]
Pubbl/distr/stampa Harlow, England ; ; Boston : , : Pearson Education, , [2012]
Descrizione fisica 1 online resource (788 pages) : illustrations
Disciplina 005.43
Soggetto topico Operating systems (Computers)
ISBN 1-4479-3014-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Operating Systems -- Contents -- Online Resources -- Preface -- About the Author -- Reader's and Instructor's Guide -- Outline of this Book -- Example Systems -- A Roadmap for Readers and Instructors -- Internet and Web Resources -- Part 1 Background -- Computer System Overview -- Basic Elements -- Evolution of the Microprocessor -- Instruction Execution -- Interrupts -- The Memory Hierarchy -- Cache Memory -- Direct Memory Access -- Multiprocessor and Multicore Organization -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Appendix 1A Performance Characteristics of Two-level Memories -- Operating System Overview -- Operating System Objectives and Functions -- The Evolution of Operating Systems -- Major Achievements -- Developments Leading to Modern Operating Systems -- Virtual Machines -- OS Design Considerations for Multiprocessor and Multicore -- Microsoft Windows Overview -- Traditional UNIX Systems -- Modern UNIX Systems -- Linux -- Linux Vserver Virtual Machine Architecture -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 2 Processes -- Process Description and Control -- What Is a Process? -- Process States -- Process Description -- Process Control -- Execution of the Operating System -- Security Issues -- UNIX SVR4 Process Management -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Threads -- Processes and Threads -- Types of Threads -- Multicore and Multithreading -- Windows 7 Thread and SMP Management -- Solaris Thread and SMP Management -- Linux Process and Thread Management -- Mac OS X Grand Central Dispatch -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Concurrency: Mutual Exclusion and Synchronization -- Principles of Concurrency -- Mutual Exclusion: Hardware Support -- Semaphores.
Monitors -- Message Passing -- Readers/Writers Problem -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Concurrency: Deadlock and Starvation -- Principles of Deadlock -- Deadlock Prevention -- Deadlock Avoidance -- Deadlock Detection -- An Integrated Deadlock Strategy -- Dining Philosophers Problem -- UNIX Concurrency Mechanisms -- Linux Kernel Concurrency Mechanisms -- Solaris Thread Synchronization Primitives -- Windows 7 Concurrency Mechanisms -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 3 Memory -- Memory Management -- Memory Management Requirements -- Memory Partitioning -- Paging -- Segmentation -- Security Issues -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Appendix 7A Loading and Linking -- Virtual Memory -- Hardware and Control Structures -- Operating System Software -- UNIX and Solaris Memory Management -- Linux Memory Management -- Windows Memory Management -- Summary -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 4 Scheduling -- Uniprocessor Scheduling -- Types of Processor Scheduling -- Scheduling Algorithms -- Traditional UNIX Scheduling -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Multiprocessor and Real-Time Scheduling -- Multiprocessor Scheduling -- Real-time Scheduling -- Linux Scheduling -- UNIX SVR4 Scheduling -- UNIX FreeBSD Scheduling -- Windows Scheduling -- Linux Virtual Machine Process Scheduling -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 5 Input/Output and Files -- I/O Management and Disk Scheduling -- I/O Devices -- Organization of the I/O Function -- Operating System Design Issues -- I/O Buffering -- Disk Scheduling -- RAID -- Disk Cache -- UNIX SVR4 I/O -- Linux I/O -- Windows I/O.
Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- File Management -- Overview -- File Organization and Access -- B-Trees -- File Directories -- File Sharing -- Record Blocking -- Secondary Storage Management -- File System Security -- UNIX File Management -- Linux Virtual File System -- Windows File System -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 6 Embedded Systems -- Embedded Operating Systems -- Embedded Systems -- Characteristics of Embedded Operating Systems -- eCos -- TinyOS -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 7 Computer Security -- Computer Security Threats -- Computer Security Concepts -- Threats, Attacks, and Assets -- Intruders -- Malicious Software Overview -- Viruses, Worms, and Bots -- Rootkits -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Computer Security Techniques -- Authentication -- Access Control -- Intrusion Detection -- Malware Defense -- Dealing with Buffer Overflow Attacks -- Windows 7 Security -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 8 Distributed Systems -- Distributed Processing, Client/Server, and Clusters -- Client/Server Computing -- Service-Oriented Architecture -- Distributed Message Passing -- Remote Procedure Calls -- Clusters -- Windows Cluster Server -- Beowulf and Linux Clusters -- Summary -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Appendix A Topics in Concurrency -- Mutual Exclusion: Software Approaches -- Race Conditions and Semaphores -- A Barbershop Problem -- Problems -- Appendix B Programming and Operating System Projects -- OS/161 -- Simulations -- Programming Projects -- Research Projects -- Reading/Report Assignments -- Writing Assignments.
Discussion Topics -- BACI -- Glossary -- References -- Index.
Record Nr. UNINA-9910151651403321
Stallings William  
Harlow, England ; ; Boston : , : Pearson Education, , [2012]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Progress in Cryptology - INDOCRYPT 2013 [[electronic resource] ] : 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings / / edited by Goutam Paul, Paul Vaudenay
Progress in Cryptology - INDOCRYPT 2013 [[electronic resource] ] : 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings / / edited by Goutam Paul, Paul Vaudenay
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVIII, 319 p. 64 illus.) : online resource
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Cryptology
Systems and Data Security
ISBN 3-319-03515-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Provable security -- Hash functions and signatures -- Side channel attacks -- Symmetric key cryptanalysis -- Key exchange and secret sharing -- Efficient implementation and hardware.- Coding theory in cryptography.
Record Nr. UNISA-996465667503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology - INDOCRYPT 2013 : 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings / / edited by Goutam Paul, Paul Vaudenay
Progress in Cryptology - INDOCRYPT 2013 : 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings / / edited by Goutam Paul, Paul Vaudenay
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVIII, 319 p. 64 illus.) : online resource
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Cryptology
Systems and Data Security
ISBN 3-319-03515-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Provable security -- Hash functions and signatures -- Side channel attacks -- Symmetric key cryptanalysis -- Key exchange and secret sharing -- Efficient implementation and hardware.- Coding theory in cryptography.
Record Nr. UNINA-9910484289103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui