default search action
Secure Smart Embedded Devices, Platforms and Applications 2014
- Konstantinos Markantonakis, Keith Mayes:
Secure Smart Embedded Devices, Platforms and Applications. Springer 2014, ISBN 978-1-4614-7914-7
Errata
- Konstantinos Markantonakis, Keith Mayes:
Errata to: Secure Smart Embedded Devices, Platforms and Applications. - Konstantinos Markantonakis, Keith Mayes:
Errata to: Secure Smart Embedded Devices, Platforms and Applications.
Embedded Devices
- Keith Mayes, Konstantinos Markantonakis:
An Introduction to Smart Cards and RFIDs. 3-25 - Serendra Reddy:
Embedded DSP Devices. 27-48 - Chris Shire:
Microprocessors and Microcontrollers Security. 49-69 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
An Introduction to the Trusted Platform Module and Mobile Trusted Module. 71-93 - Mario Kirschbaum, Thomas Plos:
Hardware and VLSI Designs. 95-116
Generic Security and Processing Platforms
- Keith Mayes, Konstantinos Markantonakis:
Information Security Best Practices. 119-144 - Michael Tunstall:
Smart Card Security. 145-177 - Peter Schwabe:
Graphics Processing Units. 179-200 - François Durvaux, Stéphanie Kerckhof, Francesco Regazzoni, François-Xavier Standaert:
A Survey of Recent Results in FPGA Security and Intellectual Property Protection. 201-224
Applications and Platform Embedded Security Requirements
- Keith Mayes, Konstantinos Markantonakis:
Mobile Communication Security Controllers. 227-266 - Gerhard P. Hancke:
Security of Embedded Location Systems. 267-286 - Jan Pelzl, Marko Wolf, Thomas J. Wollinger:
Automotive Embedded Systems Applications and Platform Embedded Security Requirements. 287-309 - Konstantinos Rantos, Konstantinos Markantonakis:
Analysis of Potential Vulnerabilities in Payment Terminals. 311-333 - Serge Chaumette, Damien Sauveron:
Wireless Sensor Nodes. 335-350 - Gerald Madlmayr, Christian Kantner, Thomas Grechenig:
Near Field Communication. 351-367 - Graham Hili, Keith Mayes, Konstantinos Markantonakis:
The BIOS and Rootkits. 369-381 - Stathis Mavrovouniotis, Mick Ganley:
Hardware Security Modules. 383-405 - Tony Boswell:
Security Evaluation and Common Criteria. 407-427 - Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security Solutions. 429-449 - Igor Nai Fovino:
SCADA System Cyber Security. 451-471
Practical Examples and Tools
- Mehari G. Msgna, Colin D. Walter:
An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms. 475-495 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
An Introduction to Java Card Programming. 497-513 - Lishoy Francis:
A Practical Example of Mobile Phone Application Using SATSA (JSR 177) API. 515-539 - Jérémie Albert, Lionel Barrère, Serge Chaumette, Damien Sauveron:
Wireless Sensors (Languages/Programming/Developments Tools/Examples). 541-564
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.