Trusted Computing for Embedded Systems

Author:   Bernard Candaele ,  Dimitrios Soudris ,  Iraklis Anagnostopoulos
Publisher:   Springer International Publishing AG
Edition:   Softcover reprint of the original 1st ed. 2015
ISBN:  

9783319362793


Pages:   299
Publication Date:   22 September 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $232.85 Quantity:  
Add to Cart

Share |

Trusted Computing for Embedded Systems


Add your own review!

Overview

Full Product Details

Author:   Bernard Candaele ,  Dimitrios Soudris ,  Iraklis Anagnostopoulos
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   Softcover reprint of the original 1st ed. 2015
Weight:   5.575kg
ISBN:  

9783319362793


ISBN 10:   3319362798
Pages:   299
Publication Date:   22 September 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Part I Introduction.- Programming Interfaces for the TPM.- Part II Application-Use cases.- Chapter 2: ARM TrustZone.- Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges.- Authentication and mutual authentication.- Low power Wireless Sensor Networks: Secure applications and remote distribution of FW updates with key management on WSN.- Part III Building blocks.- Physically Unclonable Function: Principle, design and characterization of the Loop PUF.- Physically Unclonable Function: Design of a silicon arbiter-PUF on CMOS 65 nm.- Secure Key Generator using a Loop-PUF.- Fault Sensitivity Analysis at Design Time.- Information Theoretic Comparison of Side-channel Distinguishers.- Part III Advanced Galileo Positioning technologies.- Wireless Sensor Networks: Routing protocol for critical infrastructure protection.- Wireless Sensor Networks: Virtual platform for performance analysis and attack simulation.- Heap management for trusted operating environments.- IP-XACT extensions for cryptographic IP.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List