Design Methodologies for Secure Embedded Systems
Bisher 131,99 €**
127,99 €
versandkostenfrei*

inkl. MwSt.
**Früherer Preis
Sofort lieferbar
Bequeme Ratenzahlung möglich!
ab 6,24 € monatlich
64 °P sammeln

    Broschiertes Buch

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of…mehr

Produktbeschreibung
Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.
  • Produktdetails
  • Lecture Notes in Electrical Engineering .78
  • Verlag: Springer, Berlin; Springer Berlin Heidelberg
  • Artikelnr. des Verlages: 978-3-642-42299-7
  • 2011
  • Seitenzahl: 224
  • Erscheinungstermin: 4. Dezember 2014
  • Englisch
  • Abmessung: 235mm x 155mm x 12mm
  • Gewicht: 349g
  • ISBN-13: 9783642422997
  • ISBN-10: 3642422993
  • Artikelnr.: 42162747
Inhaltsangabe
Towards Co-Design of HW/SW/Analog Systems.- A Flexible Hierarchical Approach for Controlling the System-Level.- Side-Channel Analysis { Mathematics Has Met Engineering.- Survey of Methods to Improve Side-Channel Resistance on Partial Recongurable Platforms.- Multicast Rekeying: Performance Evaluation.- Robustness Analysis of Watermark Veri cation Techniques for FPGA Netlist Cores.- Efficient and Flexible Co-Processor for Server-based Public Key Cryptography Applications.- Cellular-Array Implementations of Bio-Inspired Self-Healing Systems.- State of the Art and Future Perspectives .- Combined Man-in-the-Loop and Software-in-the-Loop Simulation.- Secure Beamforming for Weather Hazard Warning Application in Car-to-X Communication.