2021_Book_SecurityOfUbiquitousComputingS.pdf

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cry...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Γλώσσα:English
Έκδοση: Springer Nature 2021
Διαθέσιμο Online:https://www.springer.com/9783030105914
id oapen-20.500.12657-46790
record_format dspace
spelling oapen-20.500.12657-467902021-02-16T01:47:57Z Security of Ubiquitous Computing Systems Avoine, Gildas Hernandez-Castro, Julio Systems and Data Security Cyber-physical systems, IoT Professional Computing Security Science and Technology Data and Information Security Internet of Things Cryptology Cryptacus Security Ubiquitous Devices Lightweight Cryptography Symmetric Cryptography Side-Channel Analysis IoT Security Ubiquitous Computing Systems Open Access Computer security Network security Electrical engineering Cybernetics & systems theory Applied computing Security & fire alarm systems bic Book Industry Communication::U Computing & information technology::UR Computer security bic Book Industry Communication::T Technology, engineering, agriculture::TH Energy technology & engineering::THR Electrical engineering bic Book Industry Communication::U Computing & information technology bic Book Industry Communication::T Technology, engineering, agriculture::TN Civil engineering, surveying & building::TNK Building construction & materials::TNKS Security & fire alarm systems The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license. 2021-02-15T10:19:55Z 2021-02-15T10:19:55Z 2021 book ONIX_20210215_9783030105914_6 https://library.oapen.org/handle/20.500.12657/46790 eng application/pdf n/a 2021_Book_SecurityOfUbiquitousComputingS.pdf https://www.springer.com/9783030105914 Springer Nature Springer 10.1007/978-3-030-10591-4 10.1007/978-3-030-10591-4 6c6992af-b843-4f46-859c-f6e9998e40d5 2de1b435-7c46-4935-ad59-3c63b75a8a71 Springer 265 [grantnumber unknown] open access
institution OAPEN
collection DSpace
language English
description The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.
title 2021_Book_SecurityOfUbiquitousComputingS.pdf
spellingShingle 2021_Book_SecurityOfUbiquitousComputingS.pdf
title_short 2021_Book_SecurityOfUbiquitousComputingS.pdf
title_full 2021_Book_SecurityOfUbiquitousComputingS.pdf
title_fullStr 2021_Book_SecurityOfUbiquitousComputingS.pdf
title_full_unstemmed 2021_Book_SecurityOfUbiquitousComputingS.pdf
title_sort 2021_book_securityofubiquitouscomputings.pdf
publisher Springer Nature
publishDate 2021
url https://www.springer.com/9783030105914
_version_ 1771297476871979008