Emmanuel Prouff, Guenael Renault, Mattieu Rivain, Colin O'Flynn
Sērija : ISTE Invoiced
(Izdošanas datums: 04-Feb-2025, Hardback, Izdevniecība: ISTE Ltd, ISBN-13: 9781789452150)
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution o...Lasīt vairāk
Emmanuel Prouff, Guenael Renault, Mattieu Rivain, Colin O'Flynn
Sērija : ISTE Invoiced
(Izdošanas datums: 04-Feb-2025, Hardback, Izdevniecība: ISTE Ltd, ISBN-13: 9781789452136)
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution o...Lasīt vairāk
Emmanuel Prouff, Guenael Renault, Mattieu Rivain, Colin O'Flynn
Sērija : ISTE Invoiced
(Izdošanas datums: 04-Feb-2025, Hardback, Izdevniecība: ISTE Ltd, ISBN-13: 9781789452143)
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution o...Lasīt vairāk
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provides a comprehensive guide to navigating thi...Lasīt vairāk
With a focus on AI-based cybersecurity opportunities and issues in industrial IoT, this book equips readers with the knowledge and tools needed to effectively investigate and mitigate cyber threats in the age of smart devices. Cyber Investigati...Lasīt vairāk
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it int...Lasīt vairāk
AutoSAlfERs Multi-Path Attack Graph algorithm is 40 to 200 times smaller in RAM and 200 to 5 000 times faster than a comparable implementation using Bayesian networks, and the Single-Path Attack Graph algorithm constructs the most reasonable attack...Lasīt vairāk
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification....Lasīt vairāk
This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields...Lasīt vairāk
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification....Lasīt vairāk
Build secure and reliable IoT applications for Micro:bit and Raspberry Pi Pico by using Rust and Tock. One of the first Operating Systems written in Rust, Tock is designed to safely run multiple applications on low power devices, enabling y...Lasīt vairāk
Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin OFlynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing...Lasīt vairāk
This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closel...Lasīt vairāk
With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the SPD requirements raised from existing and future IoT and M2M systems. On this baseline, it proposes a new approach to embedded systems...Lasīt vairāk
(Izdošanas datums: 18-Dec-2017, Hardback, Izdevniecība: De Gruyter, ISBN-13: 9783110476040)
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the appli...Lasīt vairāk
This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully review...Lasīt vairāk
This book explores the cyber security needed for cyber-physical systems (CPSs), with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. Cyber-physical systems have emerged fr...Lasīt vairāk
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discus...Lasīt vairāk
(Izdošanas datums: 28-Aug-2015, Paperback / softback, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662483237)
This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully revi...Lasīt vairāk
For software testers and testing and development teams, this volume on mobile and embedded computing examines unique problems in the application of techniques from the traditional testing world to new systems and smart devices. The work begins with...Lasīt vairāk