Enforcing Authorization with Cryptography

Enforcing Authorization with Cryptography

LASCON via YouTube Direct link

Introduction

1 of 19

1 of 19

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Enforcing Authorization with Cryptography

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 The problem
  4. 4 Relevant Attacks
  5. 5 Common solutions
  6. 6 Direct object references
  7. 7 Sequential indirect object references
  8. 8 Random indirect references
  9. 9 Large memory footprint
  10. 10 Alternate approach
  11. 11 Referencing
  12. 12 Great
  13. 13 Benchmark Setup
  14. 14 Benchmark Results
  15. 15 Verification Time
  16. 16 Memory Usage
  17. 17 Identifier Size
  18. 18 Summary
  19. 19 Conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.