Security of Ubiquitous Computing Systems Selected Topics /

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cry...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Avoine, Gildas (Editor), Hernandez-Castro, Julio (Editor)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2021.
Edition:1st ed. 2021.
Subjects:
Online Access:Link to Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a22000005i 4500
001 978-3-030-10591-4
003 DE-He213
005 20220112143453.0
007 cr nn 008mamaa
008 210114s2021 sz | s |||| 0|eng d
020 |a 9783030105914  |9 978-3-030-10591-4 
024 7 |a 10.1007/978-3-030-10591-4  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Security of Ubiquitous Computing Systems  |h [electronic resource] :  |b Selected Topics /  |c edited by Gildas Avoine, Julio Hernandez-Castro. 
250 |a 1st ed. 2021. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2021. 
300 |a XVIII, 265 p. 25 illus., 8 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics. 
506 0 |a Open Access 
520 |a The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license. 
650 0 |a Data protection. 
650 0 |a Cooperating objects (Computer systems). 
650 0 |a Programming languages (Electronic computers). 
650 0 |a Security systems. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Cyber-Physical Systems. 
650 2 4 |a Programming Language. 
650 2 4 |a Security Science and Technology. 
700 1 |a Avoine, Gildas.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Hernandez-Castro, Julio.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783030105907 
776 0 8 |i Printed edition:  |z 9783030105921 
856 4 0 |u https://doi.org/10.1007/978-3-030-10591-4  |z Link to Metadata 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-SOB 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)