Security in Embedded Devices by Catherine H. Gebotys
By: Gebotys, Catherine H.
Material type:
Item type | Current location | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
Institute of Technology | Reference | 005.8 GEB (Browse shelf) | Not For Loan | T0041110 | ||
![]() |
Institute of Technology | Reference | 005.8 GEB (Browse shelf) | Not For Loan | T0040680 |
Total holds: 0
Where Security Began Introduction to Secure Embedded Systems The Key Using Keys Elliptic Curve Protocols Symmetric Key Protocols Including Ciphers Data Integrity and Message Authentication Side Channel Attacks on the Embedded System Countermeasures Reliable Testable Secure Systems Summary, Standards, and Ongoing Efforts Index
There are no comments for this item.