語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Trusted Computing for Embedded Systems
~
Candaele, Bernard.
Trusted Computing for Embedded Systems
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Trusted Computing for Embedded Systems/ edited by Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos.
其他作者:
Candaele, Bernard.
面頁冊數:
XXVI, 299 p. 151 illus., 102 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Electronic circuits. -
電子資源:
https://doi.org/10.1007/978-3-319-09420-5
ISBN:
9783319094205
Trusted Computing for Embedded Systems
Trusted Computing for Embedded Systems
[electronic resource] /edited by Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos. - 1st ed. 2015. - XXVI, 299 p. 151 illus., 102 illus. in color.online resource.
Part I Introduction -- Programming Interfaces for the TPM -- Part II Application-Use cases -- Chapter 2: ARM TrustZone -- Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges -- Authentication and mutual authentication -- Low power Wireless Sensor Networks: Secure applications and remote distribution of FW updates with key management on WSN -- Part III Building blocks -- Physically Unclonable Function: Principle, design and characterization of the Loop PUF -- Physically Unclonable Function: Design of a silicon arbiter-PUF on CMOS 65 nm -- Secure Key Generator using a Loop-PUF -- Fault Sensitivity Analysis at Design Time -- Information Theoretic Comparison of Side-channel Distinguishers -- Part III Advanced Galileo Positioning technologies -- Wireless Sensor Networks: Routing protocol for critical infrastructure protection -- Wireless Sensor Networks: Virtual platform for performance analysis and attack simulation -- Heap management for trusted operating environments -- IP-XACT extensions for cryptographic IP.
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. · Enables readers to address a variety of security threats to embedded hardware and software; · Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems; · Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems. .
ISBN: 9783319094205
Standard No.: 10.1007/978-3-319-09420-5doiSubjects--Topical Terms:
563332
Electronic circuits.
LC Class. No.: TK7888.4
Dewey Class. No.: 621.3815
Trusted Computing for Embedded Systems
LDR
:03663nam a22003975i 4500
001
968407
003
DE-He213
005
20200706093144.0
007
cr nn 008mamaa
008
201211s2015 gw | s |||| 0|eng d
020
$a
9783319094205
$9
978-3-319-09420-5
024
7
$a
10.1007/978-3-319-09420-5
$2
doi
035
$a
978-3-319-09420-5
050
4
$a
TK7888.4
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
245
1 0
$a
Trusted Computing for Embedded Systems
$h
[electronic resource] /
$c
edited by Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos.
250
$a
1st ed. 2015.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
XXVI, 299 p. 151 illus., 102 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Part I Introduction -- Programming Interfaces for the TPM -- Part II Application-Use cases -- Chapter 2: ARM TrustZone -- Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges -- Authentication and mutual authentication -- Low power Wireless Sensor Networks: Secure applications and remote distribution of FW updates with key management on WSN -- Part III Building blocks -- Physically Unclonable Function: Principle, design and characterization of the Loop PUF -- Physically Unclonable Function: Design of a silicon arbiter-PUF on CMOS 65 nm -- Secure Key Generator using a Loop-PUF -- Fault Sensitivity Analysis at Design Time -- Information Theoretic Comparison of Side-channel Distinguishers -- Part III Advanced Galileo Positioning technologies -- Wireless Sensor Networks: Routing protocol for critical infrastructure protection -- Wireless Sensor Networks: Virtual platform for performance analysis and attack simulation -- Heap management for trusted operating environments -- IP-XACT extensions for cryptographic IP.
520
$a
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. · Enables readers to address a variety of security threats to embedded hardware and software; · Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems; · Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems. .
650
0
$a
Electronic circuits.
$3
563332
650
0
$a
Microprocessors.
$3
632481
650
0
$a
Electronics.
$3
596389
650
0
$a
Microelectronics.
$3
554956
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Circuits and Systems.
$3
670901
650
2 4
$a
Processor Architectures.
$3
669787
650
2 4
$a
Electronics and Microelectronics, Instrumentation.
$3
670219
650
2 4
$a
Systems and Data Security.
$3
677062
700
1
$a
Candaele, Bernard.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1065102
700
1
$a
Soudris, Dimitrios.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
783536
700
1
$a
Anagnostopoulos, Iraklis.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1065103
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319094199
776
0 8
$i
Printed edition:
$z
9783319094212
776
0 8
$i
Printed edition:
$z
9783319362793
856
4 0
$u
https://doi.org/10.1007/978-3-319-09420-5
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入