Emmanuel Prouff, Guenael Renault, Mattieu Rivain, Colin O'Flynn
Sari: ISTE Invoiced
(Ilmumisaeg: 04-Feb-2025, Hardback, Kirjastus: ISTE Ltd, ISBN-13: 9781789452150)
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution o...Loe edasi...
Emmanuel Prouff, Guenael Renault, Mattieu Rivain, Colin O'Flynn
Sari: ISTE Invoiced
(Ilmumisaeg: 04-Feb-2025, Hardback, Kirjastus: ISTE Ltd, ISBN-13: 9781789452136)
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution o...Loe edasi...
Emmanuel Prouff, Guenael Renault, Mattieu Rivain, Colin O'Flynn
Sari: ISTE Invoiced
(Ilmumisaeg: 04-Feb-2025, Hardback, Kirjastus: ISTE Ltd, ISBN-13: 9781789452143)
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution o...Loe edasi...
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provides a comprehensive guide to navigating thi...Loe edasi...
With a focus on AI-based cybersecurity opportunities and issues in industrial IoT, this book equips readers with the knowledge and tools needed to effectively investigate and mitigate cyber threats in the age of smart devices. Cyber Investigati...Loe edasi...
(Ilmumisaeg: 09-Aug-2024, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031622045)
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it int...Loe edasi...
AutoSAlfERs Multi-Path Attack Graph algorithm is 40 to 200 times smaller in RAM and 200 to 5 000 times faster than a comparable implementation using Bayesian networks, and the Single-Path Attack Graph algorithm constructs the most reasonable attack...Loe edasi...
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification....Loe edasi...
This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields...Loe edasi...
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification....Loe edasi...
Build secure and reliable IoT applications for Micro:bit and Raspberry Pi Pico by using Rust and Tock. One of the first Operating Systems written in Rust, Tock is designed to safely run multiple applications on low power devices, enabling y...Loe edasi...
Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin OFlynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing...Loe edasi...
This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closel...Loe edasi...
With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the SPD requirements raised from existing and future IoT and M2M systems. On this baseline, it proposes a new approach to embedded systems...Loe edasi...
(Ilmumisaeg: 18-Dec-2017, Hardback, Kirjastus: De Gruyter, ISBN-13: 9783110476040)
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the appli...Loe edasi...
This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully review...Loe edasi...
This book explores the cyber security needed for cyber-physical systems (CPSs), with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. Cyber-physical systems have emerged fr...Loe edasi...
Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos
(Ilmumisaeg: 29-Dec-2014, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319094199)
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discus...Loe edasi...
(Ilmumisaeg: 28-Aug-2015, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662483237)
This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully revi...Loe edasi...
For software testers and testing and development teams, this volume on mobile and embedded computing examines unique problems in the application of techniques from the traditional testing world to new systems and smart devices. The work begins with...Loe edasi...