Trusted Computing for Embedded Systems

Nonfiction, Science & Nature, Technology, Electronics, Circuits, Computers, Advanced Computing, Engineering, Computer Architecture
Cover of the book Trusted Computing for Embedded Systems by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319094205
Publisher: Springer International Publishing Publication: December 11, 2014
Imprint: Springer Language: English
Author:
ISBN: 9783319094205
Publisher: Springer International Publishing
Publication: December 11, 2014
Imprint: Springer
Language: English

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.

·         Enables readers to address a variety of security threats to embedded hardware and software;

·         Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems;

·         Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.

·         Enables readers to address a variety of security threats to embedded hardware and software;

·         Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems;

·         Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.

 

More books from Springer International Publishing

Cover of the book Language Investment and Employability by
Cover of the book Fault Diagnosis and Fault-Tolerant Control Based on Adaptive Control Approach by
Cover of the book Integration of Immigrants and the Theory of Recognition by
Cover of the book Pattern Analysis, Intelligent Security and the Internet of Things by
Cover of the book Silica-coated Magnetic Nanoparticles by
Cover of the book Eric Drummond and his Legacies by
Cover of the book Discovery of the First Asteroid, Ceres by
Cover of the book The Democratic Theory of Hans-Georg Gadamer by
Cover of the book Historic Indoor Microclimate of the Heritage Buildings by
Cover of the book Advances and Applications Through Fungal Nanobiotechnology by
Cover of the book Modeling, Design, Construction, and Operation of Power Generators with Solid Oxide Fuel Cells by
Cover of the book Countdown to a Moon Launch by
Cover of the book Regenerative Medicine - from Protocol to Patient by
Cover of the book Cooperative Device-to-Device Communication in Cognitive Radio Cellular Networks by
Cover of the book Nutrition and the Welfare of Farm Animals by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy