Normal view MARC view ISBD view

Design Methodologies for Secure Embedded Systems [electronic resource] : Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss / edited by Alexander Biedermann, H. Gregor Molter.

By: Biedermann, Alexander [editor.].
Contributor(s): Molter, H. Gregor [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Electrical Engineering: 78Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Description: 204p. 91 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642167676.Subject(s): Engineering | Software engineering | Computer engineering | Systems engineering | Engineering | Circuits and Systems | Control, Robotics, Mechatronics | Electrical Engineering | Special Purpose and Application-Based SystemsDDC classification: 621.3815 Online resources: Click here to access online
Contents:
Towards Co-Design of HW/SW/Analog Systems -- A Flexible Hierarchical Approach for Controlling the System-Level -- Side-Channel Analysis { Mathematics Has Met Engineering -- Survey of Methods to Improve Side-Channel Resistance on Partial Recongurable Platforms -- Multicast Rekeying: Performance Evaluation -- Robustness Analysis of Watermark Veri cation Techniques for FPGA Netlist Cores -- Efficient and Flexible Co-Processor for Server-based Public Key Cryptography Applications -- Cellular-Array Implementations of Bio-Inspired Self-Healing Systems -- State of the Art and Future Perspectives -- Combined Man-in-the-Loop and Software-in-the-Loop Simulation -- Secure Beamforming for Weather Hazard Warning Application in Car-to-X Communication.
In: Springer eBooksSummary: Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Towards Co-Design of HW/SW/Analog Systems -- A Flexible Hierarchical Approach for Controlling the System-Level -- Side-Channel Analysis { Mathematics Has Met Engineering -- Survey of Methods to Improve Side-Channel Resistance on Partial Recongurable Platforms -- Multicast Rekeying: Performance Evaluation -- Robustness Analysis of Watermark Veri cation Techniques for FPGA Netlist Cores -- Efficient and Flexible Co-Processor for Server-based Public Key Cryptography Applications -- Cellular-Array Implementations of Bio-Inspired Self-Healing Systems -- State of the Art and Future Perspectives -- Combined Man-in-the-Loop and Software-in-the-Loop Simulation -- Secure Beamforming for Weather Hazard Warning Application in Car-to-X Communication.

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue