Linked e-resources
Details
Table of Contents
Part I: Introduction
Emerging Security Challenges for Ubiquitous Devices
Part II: Lightweight Cryptographic Primitives
Catalog and Illustrative Examples of Lightweight Cryptographic Primitives
Selected Design and Analysis Techniques in Contemporary Symmetric Encryption
An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families
Part III: Authentication Protocols
ePassport and eID Technologies
Ultra-lightweight Authentication
From Relay Attacks to Distance-Bounding Protocols
Part IV: Hardware Implementation and Systems
It Started With Templates: The Future of Profiling in Side-Channel Analysis
Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems
Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators
Finding Software Bugs in Embedded Devices
Part V: Privacy and Forensics
Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach
IoT Forensics.
Emerging Security Challenges for Ubiquitous Devices
Part II: Lightweight Cryptographic Primitives
Catalog and Illustrative Examples of Lightweight Cryptographic Primitives
Selected Design and Analysis Techniques in Contemporary Symmetric Encryption
An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families
Part III: Authentication Protocols
ePassport and eID Technologies
Ultra-lightweight Authentication
From Relay Attacks to Distance-Bounding Protocols
Part IV: Hardware Implementation and Systems
It Started With Templates: The Future of Profiling in Side-Channel Analysis
Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems
Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators
Finding Software Bugs in Embedded Devices
Part V: Privacy and Forensics
Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach
IoT Forensics.