Search Results - "Privacy"

  1. 761
  2. 762
  3. 763
  4. 764
  5. 765
  6. 766
  7. 767
  8. 768
  9. 769
  10. 770

    Security of Ubiquitous Computing Systems Selected Topics /

    Published 2021
    Table of Contents: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
    Link to Metadata
    Electronic eBook
  11. 771
  12. 772
  13. 773
  14. 774
  15. 775
  16. 776
  17. 777
  18. 778
  19. 779
  20. 780