Security in Embedded Devices
Security in Embedded Devices Cathy Gebotys Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendo...
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic |
Language: | English |
Published: |
Boston, MA :
Springer US,
2010.
|
Edition: | 1. |
Series: | Embedded Systems
|
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4419-1530-6 |
Table of Contents:
- Where Security Began
- Introduction to Secure Embedded Systems
- The Key
- Using Keys
- Elliptic Curve Protocols
- Symmetric Key Protocols Including Ciphers
- Data Integrity and Message Authentication
- Side Channel Attacks on the Embedded System
- Countermeasures
- Reliable Security Systems
- Summary, Standards and Ongoing Efforts.