Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi.
Material type:
TextSeries: NATO security through science series. D, Information and communication security ; ; vol. 2.Publication details: Amsterdam ; Washington, D.C. : IOS Press, ©2006.Description: 1 online resource (xii, 203 pages) : illustrationsContent type: - text
- computer
- online resource
- 1423797329
- 9781423797326
- 9781607501558
- 1607501554
- Embedded computer systems -- Security measures -- Congresses
- Computer security -- Congresses
- Systèmes enfouis (Informatique) -- Sécurité -- Mesures -- Congrès
- Sécurité informatique -- Congrès
- COMPUTERS -- Hardware -- Personal Computers -- General
- COMPUTERS -- Hardware -- Handheld Devices
- COMPUTERS -- Microprocessors
- Computer security
- 004.16 22
- TK7895.E42 N27 2005eb
- digitized 2010 HathiTrust Digital Library committed to preserve
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | EBSCO Computers | Available |
Proceedings from the NATO Advanced Research Workshop on "Security and Embedded Systems."
Includes bibliographical references and author index.
Print version record.
Use copy Restrictions unspecified star MiAaHDL
Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. MiAaHDL
http://purl.oclc.org/DLF/benchrepro0212
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Chaotic routing as a method of an information conversion / Y.P. Shankin -- Combinatorial game models for security systems / Edward Pogossian -- Architectural enhancements for secure embedded processing / Divya Arora, Srivaths Ravi, Anand Raghunathan and Niraj K. Jha -- Computational improvements to differential side channel analysis / David Nacache, Michael Tunstall and Claire Whelan -- A process algebra approach to authentication and secrecy / Lacramioara Astefanoaei and Gabriel Ciobanu -- Intellectual property protection using embedded systems / A.G. Fragopoulos and D.N. Serpanos -- Challenges in deeply networked system survivability / Philip Koopman, Jennifer Morris and Priya Narasimhan -- Multimedia watermarking / Bede Liu -- A platform for designing secure embedded systems / Haris Lekatsas, Jorg Henkel, Venkata Jakkula and Srimat Chakradhar -- Cryptographic insecurity of the test & repeat paradigm / Tomas Rosa -- A privacy classification model based on linkability valuation / Dan Cvrcek, Vashek Matyas and Marek Kumpost -- A run-time reconfigurable architecture for embedded program flow verification / Joseph Zambreno, Tanathil Anish and Alok Choudhary -- Model-based validation of enterprise access policies / Sandeep Bhatt, William Horne, Joe Pato, Raj Rajagopalan and Prasad Rao -- Research issues in homeland security / Theodoros Zachariadis -- Assurance in autonomous decentralized embedded system / Kinji Mori.
Vulnerabilities and countermeasures for embedded processors / Shengqi Yang, Wayne Wolf, N. Vijakrishnan, Yuan Xie and Dimitrios Serpanos -- Agent-based modeling and simulation of malefactors' attacks against computer networks / Igor Kotenko, Mihail Stepashkin and Alexander Ulanov -- Current problems in security of military networks / Jaroslav Dockal and Pavel Pokorny -- Multi-agent framework for intrusion detection and alert correlation / Vladimir Gorodetsky, Oleg Karsaev, Valdimir Samoilov and Alexander Ulanov -- Securing home and building automation systems using the zPnP approach / Ran Giladi -- REWARD : a routing method for ad-hoc networks with adjustable security capability / Zdravko Karakehayov and Ivan Radev -- On the security of the GSM cellular network / Elad Barkan and Eli Biham -- Telecommunications fraud & electronic crime in fix and mobile embedded systems / Michalis Mavis.
Added to collection customer.56279.3