Security in Embedded Devices
Gebotys, Catherine H.
Security in Embedded Devices - New York Springer Science+Business Media, Inc 2010 - 297p - Embedded Systems .
Where Security Began Introduction to Secure Embedded Systems The Key Using Keys Elliptic Curve Protocols Symmetric Key Protocols Including Ciphers Data Integrity and Message Authentication Side Channel Attacks on the Embedded System Countermeasures Reliable Testable Secure Systems Summary, Standards, and Ongoing Efforts Index
9781441915290 0.00
Computer Science
Network Secuirty
005.8 / GEB
Security in Embedded Devices - New York Springer Science+Business Media, Inc 2010 - 297p - Embedded Systems .
Where Security Began Introduction to Secure Embedded Systems The Key Using Keys Elliptic Curve Protocols Symmetric Key Protocols Including Ciphers Data Integrity and Message Authentication Side Channel Attacks on the Embedded System Countermeasures Reliable Testable Secure Systems Summary, Standards, and Ongoing Efforts Index
9781441915290 0.00
Computer Science
Network Secuirty
005.8 / GEB