Amazon cover image
Image from Amazon.com

Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi.

By: Contributor(s): Material type: TextTextSeries: NATO security through science series. D, Information and communication security ; ; vol. 2.Publication details: Amsterdam ; Washington, D.C. : IOS Press, ©2006.Description: 1 online resource (xii, 203 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1423797329
  • 9781423797326
  • 9781607501558
  • 1607501554
Subject(s): Genre/Form: Additional physical formats: Print version:: Security and embedded systems.DDC classification:
  • 004.16 22
LOC classification:
  • TK7895.E42 N27 2005eb
Online resources:
Contents:
Chaotic routing as a method of an information conversion / Y.P. Shankin -- Combinatorial game models for security systems / Edward Pogossian -- Architectural enhancements for secure embedded processing / Divya Arora, Srivaths Ravi, Anand Raghunathan and Niraj K. Jha -- Computational improvements to differential side channel analysis / David Nacache, Michael Tunstall and Claire Whelan -- A process algebra approach to authentication and secrecy / Lacramioara Astefanoaei and Gabriel Ciobanu -- Intellectual property protection using embedded systems / A.G. Fragopoulos and D.N. Serpanos -- Challenges in deeply networked system survivability / Philip Koopman, Jennifer Morris and Priya Narasimhan -- Multimedia watermarking / Bede Liu -- A platform for designing secure embedded systems / Haris Lekatsas, Jorg Henkel, Venkata Jakkula and Srimat Chakradhar -- Cryptographic insecurity of the test & repeat paradigm / Tomas Rosa -- A privacy classification model based on linkability valuation / Dan Cvrcek, Vashek Matyas and Marek Kumpost -- A run-time reconfigurable architecture for embedded program flow verification / Joseph Zambreno, Tanathil Anish and Alok Choudhary -- Model-based validation of enterprise access policies / Sandeep Bhatt, William Horne, Joe Pato, Raj Rajagopalan and Prasad Rao -- Research issues in homeland security / Theodoros Zachariadis -- Assurance in autonomous decentralized embedded system / Kinji Mori.
Vulnerabilities and countermeasures for embedded processors / Shengqi Yang, Wayne Wolf, N. Vijakrishnan, Yuan Xie and Dimitrios Serpanos -- Agent-based modeling and simulation of malefactors' attacks against computer networks / Igor Kotenko, Mihail Stepashkin and Alexander Ulanov -- Current problems in security of military networks / Jaroslav Dockal and Pavel Pokorny -- Multi-agent framework for intrusion detection and alert correlation / Vladimir Gorodetsky, Oleg Karsaev, Valdimir Samoilov and Alexander Ulanov -- Securing home and building automation systems using the zPnP approach / Ran Giladi -- REWARD : a routing method for ad-hoc networks with adjustable security capability / Zdravko Karakehayov and Ivan Radev -- On the security of the GSM cellular network / Elad Barkan and Eli Biham -- Telecommunications fraud & electronic crime in fix and mobile embedded systems / Michalis Mavis.
Action note:
  • digitized 2010 HathiTrust Digital Library committed to preserve
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Proceedings from the NATO Advanced Research Workshop on "Security and Embedded Systems."

Includes bibliographical references and author index.

Print version record.

Use copy Restrictions unspecified star MiAaHDL

Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL

Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. MiAaHDL

http://purl.oclc.org/DLF/benchrepro0212

digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL

Chaotic routing as a method of an information conversion / Y.P. Shankin -- Combinatorial game models for security systems / Edward Pogossian -- Architectural enhancements for secure embedded processing / Divya Arora, Srivaths Ravi, Anand Raghunathan and Niraj K. Jha -- Computational improvements to differential side channel analysis / David Nacache, Michael Tunstall and Claire Whelan -- A process algebra approach to authentication and secrecy / Lacramioara Astefanoaei and Gabriel Ciobanu -- Intellectual property protection using embedded systems / A.G. Fragopoulos and D.N. Serpanos -- Challenges in deeply networked system survivability / Philip Koopman, Jennifer Morris and Priya Narasimhan -- Multimedia watermarking / Bede Liu -- A platform for designing secure embedded systems / Haris Lekatsas, Jorg Henkel, Venkata Jakkula and Srimat Chakradhar -- Cryptographic insecurity of the test & repeat paradigm / Tomas Rosa -- A privacy classification model based on linkability valuation / Dan Cvrcek, Vashek Matyas and Marek Kumpost -- A run-time reconfigurable architecture for embedded program flow verification / Joseph Zambreno, Tanathil Anish and Alok Choudhary -- Model-based validation of enterprise access policies / Sandeep Bhatt, William Horne, Joe Pato, Raj Rajagopalan and Prasad Rao -- Research issues in homeland security / Theodoros Zachariadis -- Assurance in autonomous decentralized embedded system / Kinji Mori.

Vulnerabilities and countermeasures for embedded processors / Shengqi Yang, Wayne Wolf, N. Vijakrishnan, Yuan Xie and Dimitrios Serpanos -- Agent-based modeling and simulation of malefactors' attacks against computer networks / Igor Kotenko, Mihail Stepashkin and Alexander Ulanov -- Current problems in security of military networks / Jaroslav Dockal and Pavel Pokorny -- Multi-agent framework for intrusion detection and alert correlation / Vladimir Gorodetsky, Oleg Karsaev, Valdimir Samoilov and Alexander Ulanov -- Securing home and building automation systems using the zPnP approach / Ran Giladi -- REWARD : a routing method for ad-hoc networks with adjustable security capability / Zdravko Karakehayov and Ivan Radev -- On the security of the GSM cellular network / Elad Barkan and Eli Biham -- Telecommunications fraud & electronic crime in fix and mobile embedded systems / Michalis Mavis.

Added to collection customer.56279.3

Powered by Koha