Muutke küpsiste eelistusi

E-raamat: Trusted Computing for Embedded Systems

  • Formaat: PDF+DRM
  • Ilmumisaeg: 11-Dec-2014
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319094205
  • Formaat - PDF+DRM
  • Hind: 110,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 11-Dec-2014
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319094205

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.

·         Enables readers to address a variety of security threats to embedded hardware and software;

·         Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems;

·         Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.

 
Part I Introduction.- Programming Interfaces for the TPM.- Part II
Application-Use cases.
Chapter 2: ARM TrustZone.- Computer Security Anchors
in Smart Grids: The Smart Metering Scenario and Challenges.- Authentication
and mutual authentication.- Low power Wireless Sensor Networks: Secure
applications and remote distribution of FW updates with key management on
WSN.- Part III Building blocks.- Physically Unclonable Function: Principle,
design and characterization of the Loop PUF.- Physically Unclonable Function:
Design of a silicon arbiter-PUF on
CMOS 65 nm.- Secure Key Generator using a Loop-PUF.- Fault Sensitivity
Analysis at Design Time.- Information Theoretic Comparison of Side-channel
Distinguishers.- Part III Advanced Galileo Positioning technologies.-
Wireless Sensor Networks: Routing protocol for critical infrastructure
protection.- Wireless Sensor Networks: Virtual platform for performance
analysis and attack simulation.- Heap management for trusted operating
environments.- IP-XACT extensions for cryptographic IP.