Security of Ubiquitous Computing Systems

Selected Topics


Security of Ubiquitous Computing Systems
Security of Ubiquitous Computing Systems
CC BY

Book Details

Authors Gildas Avoine, Julio Hernandez-Castro
Publisher Springer
Published 2021
Edition 1st
Paperback 268 pages
Language English
ISBN-13 9783030105907, 9783030105914
ISBN-10 3030105903, 3030105911
License Creative Commons Attribution

Book Description

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems.

The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains.


This book is available under a Creative Commons Attribution license (CC BY), which means that you are free to copy, distribute, and modify it, as long as you give appropriate credit to the original author.

If you enjoyed the book and would like to support the author, you can purchase a printed copy (hardcover or paperback) from official retailers.

Download and Read Links

Share this Book

[localhost]# find . -name "*Similar_Books*"


A Treatise on Systems (volume 1)

Network and System Administration usually refers only to the traditional skills and recipes for keeping computers and networks running properly. But, in truth, this view omits the most important part of the system: humans. The skill needed to comprehend and tame systems comprising both humans and machines is that of managing complexity. In this boo

A Graduate Course in Applied Cryptography

Cryptography

Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making

Demystifying Internet of Things Security

Security

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte

Platform Embedded Security Technology Revealed

Security

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati

Building Secure and Reliable Systems

Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to h

Database Design, 2nd Edition

SQL

Database Design, 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter. Topics include:The history of databases; Characteristics and benefits of databases; Data models; Data modelling; Classification of database management sy