Search Results - "ISO"
Suggested Topics within your search.
Suggested Topics within your search.
- Technology: general issues 28
- Research & information: general 17
- History of engineering & technology 15
- linguistics 13
- Translation & interpretation 12
- Biology, life sciences 8
- Chemistry 4
- Medicine 4
- Quality Assurance (QA) & Total Quality Management (TQM) 4
- Society & social sciences 4
- Mechanical engineering & materials 3
- Organic chemistry 3
- Physics 3
- Agricultural law 2
- Biotechnology 2
- Building construction & materials 2
- Business & management 2
- Cosmology & the universe 2
- Food & society 2
- Health Policy 2
- Law 2
- Library & information services 2
- Library, archive & information management 2
- Management of specific areas 2
- Mathematics & science 2
- Medical policy 2
- Operations research 2
- Pollution control 2
- Public Policy 2
- Social Policy 2
-
1001
-
1002
State Education Councils in New State Education Plans
Published 2018Connect to this object online.
Book -
1003
-
1004
-
1005
-
1006
-
1007
-
1008
-
1009
-
1010
-
1011
-
1012
-
1013
-
1014
-
1015
-
1016
-
1017
-
1018
-
1019
-
1020
Security of Ubiquitous Computing Systems Selected Topics /
Published 2021Table of Contents: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
Link to Metadata
Electronic eBook