Public key cryptography: applications and attacks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley
2013
|
Schriftenreihe: | IEEE Press series on information and communication networks security
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XVII, 201 S. graph. Darst. 28 cm |
ISBN: | 9781118317129 |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | BV040770221 | ||
003 | DE-604 | ||
005 | 20130822 | ||
007 | t | ||
008 | 130222s2013 d||| |||| 00||| eng d | ||
016 | 7 | |a 016182125 |2 DE-101 | |
020 | |a 9781118317129 |c hbk |9 978-1-118-31712-9 | ||
035 | |a (OCoLC)835301553 | ||
035 | |a (DE-599)HBZHT017421339 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-91G |a DE-703 | ||
082 | 0 | |a 005.82 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Batten, Lynn Margaret |d 1948- |e Verfasser |0 (DE-588)123824710 |4 aut | |
245 | 1 | 0 | |a Public key cryptography |b applications and attacks |c Lynn Margaret Batten |
264 | 1 | |a Hoboken, N.J. |b Wiley |c 2013 | |
300 | |a XVII, 201 S. |b graph. Darst. |c 28 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a IEEE Press series on information and communication networks security | |
500 | |a Includes bibliographical references and index | ||
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
653 | |a Public key cryptography. | ||
653 | |a Cryptography--Mathematics. | ||
655 | 7 | |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025748603&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025748603 |
Datensatz im Suchindex
_version_ | 1804150100542357504 |
---|---|
adam_text | Table
of
Contents
Introduction
.......................... ix
Chapter
1.
Context
...................... 1
1.1.
Embedded systems
.................. 2
1.1.1.
Main components of embedded systems
. . 3
1.2.
Memory management for decreasing power
consumption, performance and area in
embedded systems
.................. 4
1.3.
State of the art in optimization techniques for
memory management and data assignment
. . 8
1.3.1.
Software optimization
............. 9
1.3.2.
Hardware optimization
............ 11
1.3.3.
Data binding
................... 16
1.3.3.1.
Memory partitioning problem for low
energy
..................... 17
1.3.3.2.
Constraints on memory bank capacities
and number of accesses to variables
. . 18
1.3.3.3.
Using external memory
.......... 19
1.4.
Operations research and electronics
....... 21
1.4.1.
Main challenges in applying operations
research to electronics
............. 23
vi Memory
Allocation
Problems in
Embedded
Systems
Chapter
2.
Unconstrained Memory Allocation
Problem
............................. 27
2.1.
Introduction
...................... 28
2.2.
An ILP formulation for the unconstrained
memory allocation problem
............. 31
2.3.
Memory allocation and the chromatic number
. 32
2.3.1.
Bounds on the chromatic number
...... 33
2.4.
An illustrative example
............... 35
2.5.
Three new upper bounds on the chromatic
number
......................... 38
2.6.
Theoretical assessment of three
upper bounds
..................... 45
2.7.
Computational assessment of three
upper bounds
..................... 49
2.8.
Conclusion
....................... 53
Chapter
3.
Memory Allocation Problem With
Constraint on the Number of Memory Banks
... 57
3.1.
Introduction
...................... 58
3.2.
An ILP formulation for the memory allocation
problem with constraint on the number of
memory banks
..................... 61
3.3.
An illustrative example
............... 64
3.4.
Proposed metaheuristics
.............. 65
3.4.1.
A tabu search procedure
............ 66
3.4.2.
A memetic algorithm
.............. 69
3.5.
Computational results and discussion
...... 71
3.5.1.
Instances
..................... 72
3.5.2.
Implementation
................. 72
3.5.3.
Results
...................... 73
3.5.4.
Discussion
.................... 75
3.6.
Conclusion
....................... 75
Table
of Contents
vii
Chapter
4.
General Memory
Allocation Problem
..................... 77
4.1.
Introduction
...................... 78
4.2.
ILP formulation for the general memory
allocation problem
.................. 80
4.3.
An illustrative example
............... 84
4.4.
Proposed metaheuristics
.............. 85
4.4.1.
Generating initial solutions
.......... 86
4.4.1.1.
Random initial solutions
......... 86
4.4.1.2.
Greedy initial solutions
.......... 86
4.4.2.
A tabu search procedure
............ 89
4.4.3.
Exploration of neighborhoods
........ 91
4.4.4.
A variable neighborhood search hybridized
with a tabu search
............... 93
4.5.
Computational results and discussion
...... 94
4.5.1.
Instances used
.................. 95
4.5.2.
Implementation
................. 95
4.5.3.
Results
...................... 96
4.5.4.
Discussion
.................... 97
4.5.5.
Assessing TabuMemex
............. 101
4.6.
Statistical analysis
.................. 105
4.6.1.
Post hoc paired comparisons
......... 106
4.7.
Conclusion
....................... 107
Chapter
5.
Dynamic Memory
Allocation Problem
..................... 109
5.1.
Introduction
...................... 110
5.2.
ILP formulation for dynamic memory
allocation problem
.................. 113
5.3.
An illustrative example
............... 116
5.4.
Iterative metaheuristic approaches
........ 119
5.4.1.
Long-term approach
.............. 119
5.4.2.
Short-term approach
.............. 122
5.5.
Computational results and discussion
...... 123
5.5.1.
Results
...................... 124
viii Memory
Allocation
Problems
in Embedded
Systems
5.5.2.
Discussion
.................... 125
5.6.
Statistical analysis
.................. 128
5.6.1.
Post hoc paired comparisons
......... 129
5.7.
Conclusion
....................... 130
Chapter
6.
MemExplorer: Cases Studies
....... 131
6.1.
The design flow
.................... 131
6.1.1.
Architecture used
................ 131
6.1.2.
MemExplorer design flow
........... 132
6.1.3.
Memory conflict graph
............. 134
6.2.
Example of MemExplorer utilization
....... 139
Chapter
7.
General Conclusions and Future Work
147
7.1.
Summary of the memory allocation
problem versions
................... 147
7.2.
Intensification and diversification
......... 149
7.2.1.
Metaheuristics for memory allocation
problem with constraint on the number of
memory banks
.................. 149
7.2.1.1.
Tabu-Allocation
............... 149
7.2.1.2.
Evo-Allocation
................ 151
7.2.2.
Metaheuristic for general memory
allocation problem
............... 151
7.2.3.
Approaches for dynamic memory
allocation problem
............... 152
7.3.
Conclusions
...................... 152
7.4.
Future work
...................... 154
7.4.1.
Theoretical perspectives
............ 154
7.4.2.
Practical perspectives
............. 156
Bibliography
.......................... 159
Index
............................... 181
|
any_adam_object | 1 |
author | Batten, Lynn Margaret 1948- |
author_GND | (DE-588)123824710 |
author_facet | Batten, Lynn Margaret 1948- |
author_role | aut |
author_sort | Batten, Lynn Margaret 1948- |
author_variant | l m b lm lmb |
building | Verbundindex |
bvnumber | BV040770221 |
classification_rvk | ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)835301553 (DE-599)HBZHT017421339 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01617nam a22004092c 4500</leader><controlfield tag="001">BV040770221</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130822 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130222s2013 d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">016182125</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118317129</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-118-31712-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)835301553</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT017421339</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Batten, Lynn Margaret</subfield><subfield code="d">1948-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123824710</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Public key cryptography</subfield><subfield code="b">applications and attacks</subfield><subfield code="c">Lynn Margaret Batten</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 201 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">28 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IEEE Press series on information and communication networks security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Public key cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography--Mathematics.</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025748603&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025748603</subfield></datafield></record></collection> |
genre | (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV040770221 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:33:33Z |
institution | BVB |
isbn | 9781118317129 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025748603 |
oclc_num | 835301553 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-91G DE-BY-TUM DE-703 |
owner_facet | DE-473 DE-BY-UBG DE-91G DE-BY-TUM DE-703 |
physical | XVII, 201 S. graph. Darst. 28 cm |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Wiley |
record_format | marc |
series2 | IEEE Press series on information and communication networks security |
spelling | Batten, Lynn Margaret 1948- Verfasser (DE-588)123824710 aut Public key cryptography applications and attacks Lynn Margaret Batten Hoboken, N.J. Wiley 2013 XVII, 201 S. graph. Darst. 28 cm txt rdacontent n rdamedia nc rdacarrier IEEE Press series on information and communication networks security Includes bibliographical references and index Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf Public key cryptography. Cryptography--Mathematics. (DE-588)4123623-3 Lehrbuch gnd-content Public-Key-Kryptosystem (DE-588)4209133-0 s DE-604 Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025748603&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Batten, Lynn Margaret 1948- Public key cryptography applications and attacks Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
subject_GND | (DE-588)4209133-0 (DE-588)4123623-3 |
title | Public key cryptography applications and attacks |
title_auth | Public key cryptography applications and attacks |
title_exact_search | Public key cryptography applications and attacks |
title_full | Public key cryptography applications and attacks Lynn Margaret Batten |
title_fullStr | Public key cryptography applications and attacks Lynn Margaret Batten |
title_full_unstemmed | Public key cryptography applications and attacks Lynn Margaret Batten |
title_short | Public key cryptography |
title_sort | public key cryptography applications and attacks |
title_sub | applications and attacks |
topic | Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
topic_facet | Public-Key-Kryptosystem Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025748603&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT battenlynnmargaret publickeycryptographyapplicationsandattacks |