//]]>
Normal View MARC View ISBD View

Design Methodologies for Secure Embedded Systems

by Biedermann, Alexander.
Authors: Molter, H. Gregor.%editor. | SpringerLink (Online service) Series: Lecture Notes in Electrical Engineering, 1876-1100 ; . 78 Physical details: 204p. 91 illus. online resource. ISBN: 3642167675 Subject(s): Engineering. | Software engineering. | Computer engineering. | Systems engineering. | Engineering. | Circuits and Systems. | Control, Robotics, Mechatronics. | Electrical Engineering. | Special Purpose and Application-Based Systems.
Tags from this library:
No tags from this library for this title.
Item type Location Call Number Status Date Due
E-Book E-Book AUM Main Library 621.3815 (Browse Shelf) Not for loan

Towards Co-Design of HW/SW/Analog Systems -- A Flexible Hierarchical Approach for Controlling the System-Level -- Side-Channel Analysis { Mathematics Has Met Engineering -- Survey of Methods to Improve Side-Channel Resistance on Partial Recongurable Platforms -- Multicast Rekeying: Performance Evaluation -- Robustness Analysis of Watermark Veri cation Techniques for FPGA Netlist Cores -- Efficient and Flexible Co-Processor for Server-based Public Key Cryptography Applications -- Cellular-Array Implementations of Bio-Inspired Self-Healing Systems -- State of the Art and Future Perspectives -- Combined Man-in-the-Loop and Software-in-the-Loop Simulation -- Secure Beamforming for Weather Hazard Warning Application in Car-to-X Communication.

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

There are no comments for this item.

Log in to your account to post a comment.

Languages: 
English |
العربية