Completed
Alternate approach
Class Central Classrooms beta
YouTube playlists curated by Class Central.
Classroom Contents
Enforcing Authorization with Cryptography
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 The problem
- 4 Relevant Attacks
- 5 Common solutions
- 6 Direct object references
- 7 Sequential indirect object references
- 8 Random indirect references
- 9 Large memory footprint
- 10 Alternate approach
- 11 Referencing
- 12 Great
- 13 Benchmark Setup
- 14 Benchmark Results
- 15 Verification Time
- 16 Memory Usage
- 17 Identifier Size
- 18 Summary
- 19 Conclusions