Markantonakis, Konstantinos

Secure Smart Embedded Devices, Platforms and Applications

Markantonakis, Konstantinos - Secure Smart Embedded Devices, Platforms and Applications, ebook


Ebook, PDF with Adobe DRM
ISBN: 9781461479154
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

Part I. Embedded Devices

1. An Introduction to Smart Cards and RFIDs
Keith Mayes, Konstantinos Markantonakis

2. Embedded DSP Devices
Serendra Reddy

3. Microprocessors and Microcontrollers Security
Chris Shire

4. An Introduction to the Trusted Platform Module and Mobile Trusted Module
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes

5. Hardware and VLSI Designs
Mario Kirschbaum, Thomas Plos

Part II. Generic Security and Processing Platforms

6. Information Security Best Practices
Keith Mayes, Konstantinos Markantonakis

7. Smart Card Security
Michael Tunstall

8. Graphics Processing Units
Peter Schwabe

9. A Survey of Recent Results in FPGA Security and Intellectual Property Protection
François Durvaux, Stéphanie Kerckhof, Francesco Regazzoni, François-Xavier Standaert

Part III. Applications and Platform Embedded Security Requirements

10. Mobile Communication Security Controllers
Keith Mayes, Konstantinos Markantonakis

11. Security of Embedded Location Systems
G. P. Hancke

12. Automotive Embedded Systems Applications and Platform Embedded Security Requirements
Jan Pelzl, Marko Wolf, Thomas Wollinger

13. Analysis of Potential Vulnerabilities in Payment Terminals
Konstantinos Rantos, Konstantinos Markantonakis

14. Wireless Sensor Nodes
Serge Chaumette, Damien Sauveron

15. Near Field Communication
Gerald Madlmayr, Christian Kantner, Thomas Grechenig

16. The BIOS and Rootkits
Graham Hili, Keith Mayes, Konstantinos Markantonakis

17. Hardware Security Modules
Stathis Mavrovouniotis, Mick Ganley

18. Security Evaluation and Common Criteria
Tony Boswell

19. Physical Security Primitives
Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann

20. SCADA System Cyber Security
Igor Nai Fovino

Part IV. Practical Examples and Tools

21. An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms
Mehari G. Msgna, Colin D. Walter

22. An Introduction to Java Card Programming
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes

23. A Practical Example of Mobile Phone Application Using SATSA (JSR 177) API
Lishoy Francis

24. Wireless Sensors (Languages/Programming/Developments Tools/Examples)
Jérémie Albert, Lionel Barrère, Serge Chaumette, Damien Sauveron

Keywords: Computer Science, Systems and Data Security, Data Structures, Cryptology and Information Theory, Information Systems Applications (incl. Internet), Computer Systems Organization and Communication Networks, Communications Engineering, Networks

Publication year
Page amount
41 pages
Information Technology, Telecommunications

Similar titles