Completed
Introduction
Class Central Classrooms beta
YouTube playlists curated by Class Central.
Classroom Contents
Enforcing Authorization with Cryptography
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 The problem
- 4 Relevant Attacks
- 5 Common solutions
- 6 Direct object references
- 7 Sequential indirect object references
- 8 Random indirect references
- 9 Large memory footprint
- 10 Alternate approach
- 11 Referencing
- 12 Great
- 13 Benchmark Setup
- 14 Benchmark Results
- 15 Verification Time
- 16 Memory Usage
- 17 Identifier Size
- 18 Summary
- 19 Conclusions