A course in number theory and cryptography
A course in number theory and cryptography
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Software security and privacy risks in mobile e-commerce
Communications of the ACM
System design methodologies for a wireless security processing platform
Proceedings of the 39th annual Design Automation Conference
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
Security for mobile low power nodes in a personal area network by means of trusted platform modules
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Power Analysis Attack Resistance Engineering by Dynamic Voltage and Frequency Scaling
ACM Transactions on Embedded Computing Systems (TECS)
Hi-index | 0.01 |
We present an overview of how the need for security will impactthe design of embedded systems and the ICs they contain. Aftera brief introduction to security, we discuss the challenges securityprocessing poses to embedded system architects, integrators, HWdesigners, and SW engineers. These challenges, as well as currentand emerging solutions to address them, are discussed in the contextof a specific application domain, namely resource-constrainedwireless embedded systems.