


default search action
Secure Smart Embedded Devices, Platforms and Applications 2014
- Konstantinos Markantonakis

, Keith Mayes:
Secure Smart Embedded Devices, Platforms and Applications. Springer 2014, ISBN 978-1-4614-7914-7
Errata
- Konstantinos Markantonakis, Keith Mayes:

Errata to: Secure Smart Embedded Devices, Platforms and Applications. - Konstantinos Markantonakis, Keith Mayes:

Errata to: Secure Smart Embedded Devices, Platforms and Applications.
Embedded Devices
- Keith Mayes, Konstantinos Markantonakis

:
An Introduction to Smart Cards and RFIDs. 3-25 - Serendra Reddy:

Embedded DSP Devices. 27-48 - Chris Shire:

Microprocessors and Microcontrollers Security. 49-69 - Raja Naeem Akram

, Konstantinos Markantonakis
, Keith Mayes:
An Introduction to the Trusted Platform Module and Mobile Trusted Module. 71-93 - Mario Kirschbaum, Thomas Plos:

Hardware and VLSI Designs. 95-116
Generic Security and Processing Platforms
- Keith Mayes, Konstantinos Markantonakis

:
Information Security Best Practices. 119-144 - Michael Tunstall

:
Smart Card Security. 145-177 - Peter Schwabe:

Graphics Processing Units. 179-200 - François Durvaux, Stéphanie Kerckhof, Francesco Regazzoni

, François-Xavier Standaert
:
A Survey of Recent Results in FPGA Security and Intellectual Property Protection. 201-224
Applications and Platform Embedded Security Requirements
- Keith Mayes, Konstantinos Markantonakis

:
Mobile Communication Security Controllers. 227-266 - Gerhard P. Hancke

:
Security of Embedded Location Systems. 267-286 - Jan Pelzl, Marko Wolf

, Thomas J. Wollinger:
Automotive Embedded Systems Applications and Platform Embedded Security Requirements. 287-309 - Konstantinos Rantos, Konstantinos Markantonakis:

Analysis of Potential Vulnerabilities in Payment Terminals. 311-333 - Serge Chaumette, Damien Sauveron:

Wireless Sensor Nodes. 335-350 - Gerald Madlmayr, Christian Kantner, Thomas Grechenig:

Near Field Communication. 351-367 - Graham Hili, Keith Mayes, Konstantinos Markantonakis

:
The BIOS and Rootkits. 369-381 - Stathis Mavrovouniotis, Mick Ganley:

Hardware Security Modules. 383-405 - Tony Boswell:

Security Evaluation and Common Criteria. 407-427 - Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:

Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security Solutions. 429-449 - Igor Nai Fovino:

SCADA System Cyber Security. 451-471
Practical Examples and Tools
- Mehari G. Msgna, Colin D. Walter:

An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms. 475-495 - Raja Naeem Akram

, Konstantinos Markantonakis
, Keith Mayes:
An Introduction to Java Card Programming. 497-513 - Lishoy Francis:

A Practical Example of Mobile Phone Application Using SATSA (JSR 177) API. 515-539 - Jérémie Albert, Lionel Barrère, Serge Chaumette, Damien Sauveron:

Wireless Sensors (Languages/Programming/Developments Tools/Examples). 541-564

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














