Zobrazeno 1 - 10
of 43
pro vyhledávání: '"Mike Bond"'
Publikováno v:
IEEE Security & Privacy. 13:56-64
The leading system for smart card-based payments worldwide, EMV (which stands for Europay, MasterCard, and Visa), is widely deployed in Europe and is starting to be introduced in the US as well. Despite this wide deployment, a series of significant v
Autor:
Mike Bond
A'captivating story of three friends on opposing sides of a betrayal...Bond tells his story in a crisp, propulsive prose that darts from sentence to sentence... He also has a sharp ear for dialogue and a knack for character development... Themes of t
Autor:
Mike Bond
'An exhilarating spy novel that offers equal amounts of ingenuity and intrigue.'-- KIRKUS In Bond's (Killing Maine, 2015, etc.) latest thriller, an intelligence operative spends decades immersed in America's struggle with Islamic terrorists. Jack is
Autor:
Mike Bond
KIRKUS - Another stellar ride from Bond; checking out Pono's first adventure [SAVING PARADISE]isn't a prerequisite, but this will make readers want to. Book Description: Surfer and Special Forces vet Pono Hawkins quits sunny Hawaii for Maine's brutal
Autor:
George French, Mike Bond
Publikováno v:
Information Security Technical Report. 15:28-32
Tamper-resistant Hardware Security Modules (HSMs) are a core technology used to build assurance in the security of large IT systems protecting and manipulating sensitive data. This paper draws on the authors years of experience working to deploy HSM-
Autor:
Mike Bond
An American climber in the Himalayas stumbles on a shipment of backpack nuclear weapons headed into Tibet for use against China. Pursued by spy agencies and other killers across Asia, North Africa, Europe and the United States, he is captured then re
Autor:
Mike Bond
The Battle of Beirut is worse than Hell, a maelstrom of implacable hatreds and frantic love affairs, of explosions, sniper battles and deadly ambushes. Neill, a journalist on a secret mission for Britain's MI6 intelligence agency, is trying to find M
Publikováno v:
Proceedings of the IEEE. 94:357-369
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their origins lie with military cipher machines and PIN processing in banking payment networks, expanding in the 1990s into embedded applications:
Autor:
Mike Bond, Jolyon Clulow
Publikováno v:
Information Security Technical Report. 11:93-99
The task of a security API is to allow users to process data and key material according to the designer's intentions, and to prevent any malicious sequence of commands from violating these intentions. Security APIs do this by attaching metadata to ke
Autor:
Jolyon Clulow, Mike Bond
Publikováno v:
Electronic Notes in Theoretical Computer Science. 125:13-24
We argue that formal analysis tools for security protocols are not achieving their full potential, and give only limited aid to designers of more complex modern protocols, protocols in constrained environments, and security APIs. We believe that typi