


default search action
Security of Ubiquitous Computing Systems, 2021
- Gildas Avoine, Julio Hernandez-Castro:
Security of Ubiquitous Computing Systems. Springer International Publishing 2021, ISBN 978-3-030-10590-7 - Miroslaw Kutylowski, Piotr Syga
, Moti Yung:
Emerging Security Challenges for Ubiquitous Devices. 3-18 - Aleksandra Mileva, Vesna Dimitrova, Orhun Kara
, Miodrag J. Mihaljevic:
Catalog and Illustrative Examples of Lightweight Cryptographic Primitives. 21-47 - Vasily Mikhalev, Miodrag J. Mihaljevic, Orhun Kara
, Frederik Armknecht:
Selected Design and Analysis Techniques for Contemporary Symmetric Encryption. 49-62 - Tomer Ashur, Atul Luykx:
An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families. 63-78 - Lucjan Hanzlik, Miroslaw Kutylowski:
ePassport and eID Technologies. 81-97 - Xavier Carpent, Paolo D'Arco, Roberto De Prisco:
Ultra-lightweight Authentication. 99-112 - Gildas Avoine, Ioana Boureanu, David Gérault, Gerhard P. Hancke, Pascal Lafourcade, Cristina Onete:
From Relay Attacks to Distance-Bounding Protocols. 113-130 - Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek:
It Started with Templates: The Future of Profiling in Side-Channel Analysis. 133-145 - Apostolos P. Fournaris, Athanassios Moschos, Nicolas Sklavos
:
Side Channel Assessment Platforms and Tools for Ubiquitous Systems. 147-163 - Darren Hurley-Smith
, Julio C. Hernandez-Castro:
Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators. 165-181 - Aurélien Francillon, Sam L. Thomas, Andrei Costin:
Finding Software Bugs in Embedded Devices. 183-197 - Agusti Solanas, Edgar Batista, Fran Casino, Achilleas Papageorgiou, Constantinos Patsakis:
Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach. 201-213 - Sasa Mrdovic
:
IoT Forensics. 215-229

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.