Secure smart embedded devices, platforms and applications /
Saved in:
Imprint: | New York : Springer, [2013?] ©2014 |
---|---|
Description: | 1 online resource. |
Language: | English |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11080650 |
Table of Contents:
- Part I. Embedded Devices
- An Introduction to Smart Cards and RFIDs / Keith Mayes and Konstantinos Markantonakis
- Embedded DSP Devices / Serendra Reddy
- Microprocessors and Microcontrollers Security / Chris Shire
- An Introduction to the Trusted Platform Module and Mobile Trusted Module / Raja Naeem Akram, Konstantinos Markantonakis and Keith Mayes
- Hardware and VLSI Designs / Mario Kirschbaum and Thomas Plos
- Part II. Generic Security and Processing Platforms
- Information Security Best Practices / Keith Mayes and Konstantinos Markantonakis
- Smart Card Security / Michael Tunstall
- Graphics Processing Units / Peter Schwabe
- A Survey of Recent Results in FPGA Security and Intellectual Property Protection / François Durvaux, Stéphanie Kerckhof, Francesco Regazzoni and François-Xavier Standaert
- Part III. Applications and Platform Embedded Security Requirements
- Mobile Communication Security Controllers / Keith Mayes and Konstantinos Markantonakis
- Security of Embedded Location Systems / G. P. Hancke
- Automotive Embedded Systems Applications and Platform Embedded Security Requirements / Jan Pelzl, Marko Wolf and Thomas Wollinger
- Analysis of Potential Vulnerabilities in Payment Terminals / Konstantinos Rantos and Konstantinos Markantonakis
- Wireless Sensor Nodes / Serge Chaumette and Damien Sauveron
- Near Field Communication / Gerald Madlmayr, Christian Kantner and Thomas Grechenig
- The BIOS and Rootkits / Graham Hili, Keith Mayes and Konstantinos Markantonakis
- Hardware Security Modules / Stathis Mavrovouniotis and Mick Ganley
- Security Evaluation and Common Criteria / Tony Boswell
- Physical Security Primitives / Ahmad-Reza Sadeghi, Steffen Schulz and Christian Wachsmann
- SCADA System Cyber Security / Igor Nai Fovino
- Part IV. Practical Examples and Tools
- An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms / Mehari G. Msgna and Colin D. Walter
- An Introduction to Java Card Programming / Raja Naeem Akram, Konstantinos Markantonakis and Keith Mayes
- A Practical Example of Mobile Phone Application Using SATSA (JSR 177) API / Lishoy Francis
- Wireless Sensors (Languages/Programming/Developments Tools/Examples) / Jérémie Albert, Lionel Barrère, Serge Chaumette and Damien Sauveron
- Errata to: Secure Smart Embedded Devices, Platforms and Applications / Konstantinos Markantonakis and Keith Mayes.